EP2384571B1 - Trustworthiness decision making for access authentication - Google Patents

Trustworthiness decision making for access authentication Download PDF

Info

Publication number
EP2384571B1
EP2384571B1 EP09778916.8A EP09778916A EP2384571B1 EP 2384571 B1 EP2384571 B1 EP 2384571B1 EP 09778916 A EP09778916 A EP 09778916A EP 2384571 B1 EP2384571 B1 EP 2384571B1
Authority
EP
European Patent Office
Prior art keywords
network
access
user
access point
access network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP09778916.8A
Other languages
German (de)
French (fr)
Other versions
EP2384571A1 (en
Inventor
Robert Ropolyi
Guenther Horn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Solutions and Networks Oy
Original Assignee
Nokia Solutions and Networks Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Solutions and Networks Oy filed Critical Nokia Solutions and Networks Oy
Publication of EP2384571A1 publication Critical patent/EP2384571A1/en
Application granted granted Critical
Publication of EP2384571B1 publication Critical patent/EP2384571B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W80/00Wireless network protocols or protocol adaptations to wireless operation
    • H04W80/04Network layer protocols, e.g. mobile IP [Internet Protocol]

Definitions

  • the present invention generally relates to trustworthiness decision making for access authentication.
  • the present invention relates to access authentication with respect to the trustworthiness of non-3GPP access networks within a 3GPP-compliant packet data system.
  • a system configuration in which a core network and/or home network and/or a visited network (in case of roaming) comply with a specific standard specification, for example a 3GPP (Third Generation Partnership Project) specification, but at least one access network via which a user equipment connects to the 3GPP core/home/visited network does not comply with a 3GPP standard specification.
  • a non-3GPP access network Such an access network is called a non-3GPP access network. It may comply with other standards, e.g. the HRPD standard defined by 3GPP2 or the WiMAX standard defined by the WiMAX Forum. It is to be noted that such a system configuration is taken as a non-limiting example, while similar system configurations are equally applicable as well.
  • a user equipment is connected to a 3GPP evolved packet system (EPS) via a non-3GPP (e.g. HRPD (High Rate Packet Data) or WiMAX (Worldwide Interoperability for Microwave Access)) access network.
  • Communication connectivity e.g. Internet Protocol (IP) connectivity
  • IP Internet Protocol
  • the security requirements and the requested authentication methods for trusted and untrusted non-3GPP access networks, as well as AAA (authentication, authorization and accounting) interfaces and procedures for the non-3GPP access network are also in accordance with 3GPP standard specifications, such as 3GPP TS33.402 and 3GPP TS29.273.
  • 3GPP standard specifications such as 3GPP TS33.402 and 3GPP TS29.273.
  • Known authentication mechanisms such as EAP methods, e.g. EAP-AKA and EAP-AKA' (EAP: Extensible Authentication Protocol, AKA: Authentication and Key Agreement) are applicable in accordance with 3GPP standard specifications.
  • EAP-AKA and EAP-AKA' EAP: Extensible Authentication Protocol, AKA: Authentication and Key Agreement
  • a decision as to whether the access network is trusted or untrusted is to be made in the user's home network, for example by an AAA server residing in the HPLMN (home public land mobile network).
  • This decision shall take into account business/ administrative conditions (e.g. direct roaming agreement with the operator of the access network) and technical conditions. Necessary or relevant technical conditions are dependent on the underlying network scenario and/or utilized protocols.
  • the following technical conditions are applicable for the S2a interface (between an access network and a packet data network gateway) using network-based mobility, i.e. Proxy Mobile IP (PMIP) as IP mobility management protocol.
  • PMIP Proxy Mobile IP
  • the MAG Mobile Access Gateway
  • LMA Local Mobility Anchor
  • Security for PMIP messages between MAG and LMA shall be provided either by a chain of security associations in a hop-by-hop fashion (for each hop in such a chain, one security association per direction shall be used for all PMIP messages relating to any user), or by one security association per direction for all PMIP messages relating to any user in an end-to-end fashion for the intra-domain case.
  • PMIP shall be used only in conjunction with EAP-AKA-based access authentication.
  • the following technical conditions are applicable for the S2c interface (between a user equipment and a packet data network gateway) using host-based mobility, i.e. Dual Stack Mobile IPv6 (DSMIPv6) as IP mobility management protocol.
  • DSMIPv6 Dual Stack Mobile IPv6
  • An access network needs to fulfill several security requirements to be trusted when host-based mobility is used.
  • the trusted access will authenticate the user equipment and provide a secure link for the data to be transferred from the user equipment to the trusted access.
  • the trusted access protects against source IP address spoofing.
  • the trusted access and the packet data network gateway (PDN GW) will have a secure link between them to transfer the user's data across.
  • the trusted access and the evolved packet core need to co-ordinate when the user equipment detaches from the trusted access in order to ensure that the IP address that was assigned to the user equipment is not be used by another user equipment without EPC being aware of the change (i.e. enable the PDN GW to remove the CoA (care-of-address) binding for the old user equipment).
  • a packet data network gateway may be dynamically allocated during an authentication procedure. Therefore, for example in terms of a condition of a secure IP link between a non-3GPP access gateway and the PDN GW, the IP link in question can be between the non-3GPP access network and the home network (in case home routing is selected, i.e. the PDN GW is located in the home network) or between the non-3GPP access network and the visited network (in case local breakout is selected, i.e. the PDN GW is located in the visited network).
  • the IP link may use different routes and different IP transport providers (e.g. network operators) for the cases of home routing and local breakout (LBO) case. Consequently, the security aspects concerning the respective IP links may also be different, thus hampering the availability of proper information for decision making at the home network.
  • IP transport providers e.g. network operators
  • GSM Global System for Mobile Communication
  • UTRAN Universal Terrestrial Radio Access Network
  • the home network may make a wrong decision, not correctly taking into account all relevant conditions, e.g. the security of the link to be used. If the home network decides for the access network being untrusted, even though this would not be required, this will lead to unnecessary resource consumption and/or time delay.
  • an evolved packet data gateway ePDG
  • ePDG evolved packet data gateway
  • a tunnel setup procedure between user equipment and ePDG may be unnecessarily executed.
  • the home network decides for the access network being trusted, even though there is e.g. no secure IP link between the access network and the visited network, this will lead to a break of confidentiality requirements, and thus e.g. eavesdropping may become possible.
  • XP050265687 discloses handling trust information between a non-3GPP access network and a 3GPP access network.
  • a VPLMN informs an HPLMN of trustworthiness of the access network and the HPLMN takes such input from the VPLMN into consideration when making a decision whether the access network is trusted or untrusted.
  • WO 2008/155066 relates to trust relationship detection between a core and an access network.
  • a security tunnel establishment procedure is used to determine whether the access network is trusted or untrusted.
  • 3GPP Technical Specification Group Core Network and Terminals; Evolved Packet System; 3GPP EPS AAA Interfaces (Release 8)", 3GPP DRAFT; 29273-120-RM, 21 November 2008 (2008-11-21 ), XP050314439, relates to 3GPP AAA reference points used by different non-3GPP accesses included in the Evolved Packet System (EPS).
  • EPS Evolved Packet System
  • 3GPP Technical Specification Group Services and System Aspects; 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses;(Release 8)", 3GPP DRAFT; 33402_200, 19 December 2008 (2008-12-19), XP002545562, relates to the security architecture, the security feature groups, and the security mechanisms performed during inter working between non-3GPP accesses and the Evolved Packet System (EPS).
  • SAE 3GPP System Architecture Evolution
  • EPS Evolved Packet System
  • 3GPP Technical Specification Group Core Network and Terminals; Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP access networks; Stage 3; (Release 8)", 3GPP DRAFT; 24302-120-RM, no. Shanghai; 20081121, 21 November 2008 (2008-11-21 ), XP050310470, relates to the discovery and network selection procedures for access to 3GPP Evolved Packet Core (EPC) via non-3GPP access networks and includes Authentication and Access Authorization using Authentication, Authorization and Accounting (AAA) procedures used for the interworking of the 3GPP EPC and the non-3GPP access networks.
  • AAA Authentication, Authorization and Accounting
  • the present invention and its embodiments are made to provide for a feasible solution for ensuring secure and efficient access procedures based on the availability of information relating to the trustworthiness of access networks within a packet data system.
  • non-3GPP access networks in connection with 3GPP-compliant core networks (e.g. home and/or visited networks), i.e. a 3GPP evolved packet system, are used as a non-limiting example in this regard.
  • 3GPP-compliant core networks e.g. home and/or visited networks
  • 3GPP evolved packet system i.e. a 3GPP evolved packet system
  • VPN visited public land mobile network
  • HPLMN home public land mobile network
  • HPLMN home public land mobile network
  • HPLMN home public land mobile network
  • the AAA Server shall take into account the trusted/untrusted indication received from the VPLMN. This does not mean an automatic acceptance, namely the HPLMN operator shall have the right to make an "untrusted" decision even though the VPLMN has indicated a "trusted” decision and LBO is selected.
  • LBO local breakout
  • embodiments of the present invention may be implemented using an interface between a non-3GPP access network and the 3GPP AAA Proxy, which may be referred to as STa interface, and the interface between the 3GPP AAA Proxy and the 3GPP AAA Server, which can be referred to as SWd interface, in accordance with present exemplary network configurations.
  • STa interface the interface between the 3GPP AAA Proxy and the 3GPP AAA Server
  • SWd interface the interface between the 3GPP AAA Proxy and the 3GPP AAA Server
  • Figure 1 shows a schematic block diagram of a network configuration in case of home routing using the S2a interface, in which embodiments of the present invention are applicable.
  • non-3GPP access networks (for example, one being denoted as (potentially) trusted and one being denoted as untrusted) are connected to a home network HPLMN of a user (i.e. a user equipment) via a visited network VPLMN, which is due to the assumption of a roaming case.
  • the roaming user equipment is not shown, but is provided with packet data access by any one of the thus depicted non-3GPP access networks. Since a home routing (HR) scenario is assumed in Figure 1 , the PDN gateway is located in the home network.
  • HR home routing
  • Figure 2 shows a schematic block diagram of a network configuration in case of local breakout using the S2a interface, in which embodiments of the present invention are applicable.
  • FIG. 2 a similar network configuration as that of Figure 1 is illustrated, but differs in that a local breakout (LBO) scenario is assumed. Hence, the PDN gateway is located in the visited network.
  • LBO local breakout
  • Figure 3 shows a schematic block diagram of a network configuration in case of home routing using the S2c interface, in which embodiments of the present invention are applicable.
  • non-3GPP access networks (for example, one being denoted as (potentially) trusted and one being denoted as untrusted) are connected to a home network HPLMN of a user (i.e. a user equipment) via a visited network VPLMN, which is due to the assumption of a roaming case.
  • the roaming user equipment is provided with packet data access by any one of the thus depicted non-3GPP access networks. Since a home routing scenario is assumed in Figure 3 , the PDN gateway is located in the home network.
  • Figure 4 shows a schematic block diagram of a network configuration in case of local breakout using the S2c interface, in which embodiments of the present invention are applicable.
  • FIG. 4 a similar network configuration as that of Figure 3 is illustrated, but differs in that a local breakout (LBO) scenario is assumed. Hence, the PDN gateway is located in the visited network.
  • LBO local breakout
  • Figure 5 shows a message flow diagram of an access authentication procedure in the network configuration of any one of Figures 1 to 4 according to an exemplary embodiment of the present invention.
  • the potentially trusted non-3GPP access network supports the EAP-AKA' authentication over the STa interface, as it is supposed to be for most of non-3GPP access networks that shall be handled as trusted by a 3GPP network.
  • Figure 5 shows details for an access authentication and authorization for an initial attach to a non-3GPP access network for a roaming case, using the STa and SWd interface.
  • those aspects of the thus depicted access authentication are described in more details, which are relevant for embodiments of the present invention.
  • step 1 a connection is established between the user equipment UE and a "potentially trusted" non-3GPP access network (the decision is made during this process, see below), using a procedure specific to the non-3GPP access network (which is out of scope here).
  • a roaming case is assumed here, i.e. the user is roaming in a foreign network. Therefore, the access network is connected to a visited network VPLMN (a roaming partner of the home network HPLMN).
  • an authenticator in the trusted non-3GPP access network sends an EAP Request/Identity to the UE.
  • step 3 the UE sends an EAP Response/Identity message, including a network access identifier (NAI).
  • NAI network access identifier
  • the trusted non-3GPP access network generates a Diameter authentication and authorization request for EAP (e.g. DER: Diameter EAP Request) and includes (among others) the EAP response, the access type and the identity of the access network.
  • the request is routed towards the proper AAA Proxy (i.e. to a proper VPLMN), based on the realm part of the NAI.
  • the AAA proxy shall include the visited network identifier (identifying the VPLMN) in the DER request.
  • the 3GPP AAA Proxy (in the VPLMN) provisionally determines the trustworthiness of the access network concerned, i.e. evaluates the trust relationship between the non-3GPP access network and the VPLMN. To this end, it uses the assumption that the PDN gateway shall be allocated in the VPLMN (due to the LBO scenario), while taking into account all information on the access network which is available in the VPLMN, e.g. the security level of the IP link between the access network and the VPLMN or the radio access technology (RAT) in the access network.
  • the decision factors may be configured as part of the local policies in the AAA Proxy in the VPLMN. The result, i.e.
  • the trusted/untrusted decision for the VPLMN shall be added to the forwarded DER request.
  • This may be implemented by way of a specifically assigned attribute-value pair AVP (which could for example be denoted as "AN-Trusted AVP", wherein the possible values are “Trusted” and “Untrusted”).
  • AVP attribute-value pair
  • the DER request is then routed via the SWd interface to the proper 3GPP AAA Server in the HPLMN based on the realm part of the NAI.
  • step 6 after the 3GPP AAA Server received the DER request that contains the EAP Response/Identity message, the subscriber identity and the radio access technology (RAT) over the SWd interface, it checks whether it has an unused authentication vector for EAP-AKA' and, if not, a set of new authentication vectors is retrieved from the home subscriber server HSS.
  • the HSS generates authentication vectors and sends them to the 3GPP AAA server, the AAA Server stores the authentication vectors (if more then one was requested/received), the AAA Server retrieves the subscription data of the user, and the HSS sends the subscription data.
  • the 3GPP AAA Server verifies that the subscriber is authorized to use the evolved packet system (EPS) and the non-3GPP access network. If the user is authorized, then, based on the received indicators (from the user equipment and the access network) and the subscription data (i.e. whether a fixed PDN GW is assigned to the UE, PDN GW allocation in the VPLMN is allowed or not), the AAA Server decides about the trustworthiness of the access network in question.
  • EPS evolved packet system
  • the 3GPP AAA Server in the HPLMN decides - for each subscribed access point name (APN) of the user - whether local breakout or home routing is to be used. It may allocate a PDN GW for (some of) the access point names. And, according to embodiments of the present invention, the 3GPP AAA Server in the HPLMN decides about whether the access network is to be handled as trusted or untrusted, i.e. about the final trustworthiness thereof.
  • the 3GPP AAA Server takes the VPLMN's provisional trustworthiness decision, i.e. the trustworthiness indication received from the VPLMN decision (e.g. the value of the AN-Trusted AVP) into consideration.
  • the trustworthiness indication received from the VPLMN decision e.g. the value of the AN-Trusted AVP
  • the AAA Server accepts the VPLMN's provisional decision in terms of technical decision factors. It may still decide for the access network being "untrusted”, if there is a specific business-related (i.e. administrative) reason for doing so (e.g. due to previous subscriber complaints, limited trust with the VPLMN, etc.), but it shall not decide for the access network being "trusted”, if the VPLMN indicated an "untrusted” state.
  • a specific business-related (i.e. administrative) reason for doing so e.g. due to previous subscriber complaints, limited trust with the VPLMN, etc.
  • the AAA Server shall not take into consideration the received VPLMN's provisional trust indication (because the relevant IP link shall be between the AN and the HPLMN, and not the VPLMN). That is, the VPLMN's provisional decision is discarded in this case, and a decision is made at the AAA Server in the home network on its own.
  • the AAA server makes sub-decisions separately for the local breakout and the home routing cases, i.e. for those access point names for which local breakout or home routing is applicable, which is accomplished as described above for the respective special cases, and then combines them into a single, joint decision for both groups. Namely, it decides for "trusted”, only if both sub-decisions are "trusted”.
  • ePDG evolved packet data gateway
  • the AAA Server makes separate decisions for the local breakout and the home routing cases, i.e. for those subscribed access point names for which local breakout or home routing is applicable, which is accomplished as described above for the respective special cases. Then, if these decisions are different, the AAA Server indicates to the user equipment UE, for which access point names the access network is to be handled as trusted and for which access point names the access network is to be handled as untrusted.
  • the UE may send PDN connection requests to the non-3GPP gateway (if PMIP is used) or directly to the PDN GW (if DS-MIPv6 is used).
  • the UE In order to request PDN connections for any of those APNs, for which the access network was decided to be untrusted, the UE shall firstly set up a tunnel to an ePDG, and then a corresponding PDN connection request shall be sent via this tunnel.
  • an access point name identifies a service provided by a packet data network, and is independent of the access network as such or any access point in the sense of an interface provided by an access network.
  • a user's subscription profile as stored in the HLR, contains data like the authorization to invoke some services (i.e. connect to some PDNs), and also whether for these, the LBO or home routing is to be used.
  • the 3GPP AAA Server sends an EAP-AKA' authentication request (EAP Request/AKA'-Challenge message) included in a Diameter EAP Answer (e.g. DEA: Diameter EPA Answer) request.
  • the 3GPP AAA Server informs the UE about the trust status of the access network in the AT_TRUST_IND attribute included in the EAP Request/AKA'-Challenge message.
  • the AAA proxy forwards the request to the non-3GPP AN, including an AKA' challenge.
  • the authenticator in the access network sends the EAP Request/AKA'-Challenge message to the UE.
  • step 15 the UE (the USIM (Universal Subscriber Identity Module) application) authenticates the network, computes the authentication response value and sends it in an EAP-Response message.
  • the authenticator in the access network sends the EAP Response/AKA'-Challenge packet to 3GPP AAA Proxy.
  • step 17 the AAA Proxy forwards the request to the AAA Server.
  • step 18 the AAA Server compares the received authentication result with the expected result (received within the authentication vector) and considers the authentication as successful, if they are equal.
  • step 19 if the authentication was successful, the AAA Server registers the user in the HSS.
  • the HSS acknowledges that the UE was registered.
  • the AAA Server sends a final DEA answer (indicating successful completion of the Diameter authentication process), including (among others) all the relevant APN-related data (which contains the PGN GW identity, if the AAA Server allocated a PDN GW or received it from the HSS, or if no PDN GW identity is sent, an indicator, whether the non-3GPP GW may allocate a PDN GW in the VPLMN, the selected IP mobility mode and EAP-Success information) to the AAA Proxy.
  • the AAA Proxy forwards the DEA request to the non-3GPP access network.
  • the authenticator in the access network informs the UE about the successfully completed authentication.
  • Subsequent steps after the access authentication depend on the mobility mode and the trust indication as received by the UE.
  • the UE shall act according to the received trusted/untrusted indication when requesting a PDN connection, as is detailed below.
  • the interface used for the user plane can be the S2a interface (when the decision is trusted and PMIP is used) or the S2b interface (when the decision is untrusted and PMIP is used; then, the UE shall need to set up a secure channel to the ePDG) or also the S2c interface (when DSMIP is used; the packets are sent to the PDN GW either directly - in case of trusted access - or through the ePDG - in case of untrusted access).
  • an access authentication for an initial attach to an access network has been described in detail.
  • the access authentication to be executed in case of a handover to a non-3GPP access network is similar to that for the initial attach.
  • the differences e.g. some PDN gateways may have already been allocated before the handover, and the AAA Server receives them from the HSS
  • 3GPP standards allow that a non-3GPP access network can be trusted also without supporting EAP methods and specifically, EAP-AKA' (as has been assumed above).
  • EAP-AKA' as has been assumed above.
  • the UE will not be informed about the trustworthiness of the non-3GPP access network and unless it has preconfigured information about the specific access network to be handled as trusted, it shall treat it (at least initially, until it gains such information) as untrusted.
  • the first alternative described above cannot be used; a specific solution, which is described in the following, is needed.
  • embodiments of the present invention may be implemented using a new path for the authentication messaging, as presented as thick dotted line in Figures 3 and 4 .
  • a thick dotted line ranging from the user equipment to the 3GPP AAA Server in the home network, passing through a trusted access network as well as the evolved packet data gateway ePDG and the 3GPP AAA Proxy in the visited network.
  • This thick dotted line represents a specific message route according to embodiments of the present invention. Namely, according to exemplary embodiments for the special case of a trusted non-3GPP access network without EAP support, the trusted non-3GPP access gateway may be connected (at least temporarily, for the authentication) with the ePDG.
  • the above-mentioned special case builds the basis for the present second alternative in line with the present invention. Namely, the following scenarios build upon the assumption that a non-3GPP access network is trusted, but does not support EAP, and the UE has no preconfigured information about the access network to be handled as trusted. For this specific case, the UE shall initiate the setup of a secure tunnel to an ePDG, before requesting any PDN connection. In fact, the UE does so, while it is attached to a trusted - or at least "potentially trusted" - non-3GPP access network. This results in the communication path represented by the thick dotted line in Figures 3 and 4 .
  • Figure 6 shows a message flow diagram of an access authentication procedure in the network configuration of any one of Figures 3 and 4 according to an exemplary embodiment of the present invention, when this new communication path is used.
  • Figure 6 shows details for an access authentication and authorization for an initial attach to a non-3GPP access network, which is equally applicable for a handover.
  • those aspects of the thus depicted access authentication are described in more details, which are relevant for embodiments of the present invention.
  • step 1 the UE and the ePDG exchange the first pair of messages, known as IKE_SA_INIT, in which the ePDG and UE negotiate cryptographic algorithms, exchange nonces and perform a Diffie_Hellman exchange.
  • step 2 the UE sends the user identity and the APN information in this first message of the IKE_AUTH phase, and begins negotiation of child security associations.
  • the UE omits the AUTH parameter in order to indicate to the ePDG that it wants to use EAP over IKEv2 (Internet Key Exchange version 2).
  • the user identity shall be compliant with Network Access Identifier (NAI) format, containing the IMSI or the pseudonym.
  • NAI Network Access Identifier
  • the UE shall send the configuration payload (CFG_REQUEST) within the IKE_AUTH request message to obtain a remote IP Address.
  • the ePDG sends the Authentication Request message with an EAP AVP to the 3GPP AAA Server via the 3GPP AAA Proxy, containing the user identity, APN information, an ePDG selection parameter, and a (provisional) trustworthiness indication of the access network in question.
  • the ePDG shall include a parameter indicating that the authentication is being performed for tunnel establishment with an ePDG. This will help the 3GPP AAA Server distinguish among authentications for trusted access or tunnel setup for I-WLAN (Interworking Wireless Local Area Network)..
  • the ePDG in the VPLMN provisionally determines the trustworthiness of the access network concerned, i.e. evaluates the trust relationship between the non-3GPP access network and the VPLMN.
  • the PDN gateway uses the assumption that the PDN gateway shall be allocated in the VPLMN (due to the LBO scenario), while taking into account all information on the access network which is available in the VPLMN, e.g. the security level of the IP link between the access network and the VPLMN or the radio access technology (RAT) in the access network.
  • the decision factors may be configured as part of the local policies in the ePDG in the VPLMN. The result, i.e.
  • the trusted/untrusted decision for the VPLMN shall be added to the forwarded (DER) authentication request.
  • This may be implemented by way of a specifically assigned attribute-value pair AVP (which could for example be denoted as "AN-Trusted AVP", wherein the possible values are “Trusted” and “Untrusted”).
  • AVP attribute-value pair
  • the (DER) authentication request is then routed to the proper 3GPP AAA Proxy, which in turn forwards it to the 3GPP AAA Server in the HPLMN based on the realm part of the NAI.
  • the 3GPP AAA Server shall fetch the user profile and authentication vectors from the home subscriber server HSS and/or home location register HLR (if these parameters are not available in the 3GPP AAA Server).
  • the 3GPP AAA Server shall include the parameter received in step 4 indicating that the authentication is being performed for tunnel establishment with an ePDG in the request to the HSS.
  • the 3GPP AAA server shall also fetch the user profile (if it is not yet available there) and, based on that, it shall decide for each subscribed APN (access point name) of the user, whether home routing or local breakout is to be used, i.e.
  • the AAA server shall decide about the access network to be handled as trusted or untrusted. (Note that without receiving the trust indication from the VPLMN, no such decision is needed, as the access network is always considered to be untrusted if the ePDG is involved in the access authentication.)
  • the 3GPP AAA Server in the HPLMN decides about whether the access network is to be handled as trusted or untrusted, i.e. about the final trustworthiness thereof.
  • the 3GPP AAA Server takes the VPLMN's provisional trustworthiness decision, i.e. the trustworthiness indication received from the VPLMN decision (e.g. the value of the AN-Trusted AVP) into consideration.
  • the VPLMN decision e.g. the value of the AN-Trusted AVP
  • the decision making and the feasible options are similar to those described above in connection with the STa interface. Thus, details (cf. step 11 according to Figure 5 ) are not repeated here for the sake of brevity.
  • the AAA server After the AAA server has determined that the access network is trusted indeed (this means trusted for all APNs for the first option, or at least for some of the subscribed APNs for the second option), the AAA server shall include the AT_TRUST_IND attribute (or, in case of the second option, the new attribute, if that will be used for encoding the decision) in the EAP Request/AKA-Challenge message.
  • step 6 the 3GPP AAA Server initiates the authentication challenge.
  • the user identity is not requested again.
  • the trust indication as determined above is included in the request.
  • step 7 the 3GPP AAA Proxy forwards the request to the ePDG.
  • step 8 the ePDG responds to the UE with its identity, a certificate, and sends the AUTH parameter to protect the previous message it sent to the UE (in the IKE_SA_INIT exchange). It completes the negotiation of the child security associations as well.
  • the EAP message received from the 3GPP AAA Server (EAP-Request/AKA-Challenge) is included in order to start the EAP procedure over IKEv2.
  • step 9 the UE checks the authentication parameters and responds to the authentication challenge.
  • the only payload (apart from the header) in the IKEv2 message is the EAP message.
  • the UE may decide to abort the IKEv2 procedure. If the UE aborts the IKEv2 procedure, the UE shall then initiate a DS-MIPv6 binding to the PDN gateway, without involving the ePDG. Otherwise, the UE continues with the standard procure which is omitted from Figure 6 .
  • the UE if the UE receives the EAP-Request/AKA-challenge message with the AT_TRUST_IND attribute (or the relevant new attribute if that is chosen for encoding the access network trust indication) included and indicating that the access network is trusted for some of the subscribed APNs but not for all of them, the UE shall complete the IKEv2 authentication procedure and set up a secure tunnel to the ePDG. Subsequent to that, the UE shall behave for each APN specifically. When the UE initiates a setup of PDN connections to an APN, for which the access network was indicated as untrusted, the UE shall set up a DS-MIPv6 binding to the PDN gateway via the ePDG (i.e.
  • the UE may set up a DS-MIPv6 binding to the PDN gateway directly, without involving the ePDG.
  • the ePDG may have several sources available to decide whether an access network should be considered trusted e.g. the security level of the IP link between the access network and the VPLMN or the radio access technology in the access network.
  • the decision factors shall be configured as part of the local policies in the ePDG. This is similar to the process described for the AAA proxy in the case of the S2a interface, with the ePDG here taking the role of the AAA proxy.
  • the interface used for the user plane can be the S2c interface going directly to the PDN GW, if the final trustworthiness decision is "trusted", or via the ePDG, if the final trustworthiness decision is "untrusted”. If a separate decision is made for the APNs yielding local breakout and those yielding home routing, the S2c interface shall have different paths for these groups of APNs.
  • Figure 7 shows a schematic flow chart of a method being executable at a home network entity according to an exemplary embodiment of the present invention.
  • the home network entity executing the thus depicted method may for example be a 3GPP AAA server, as depicted in Figures 1 to 4 above.
  • the thus depicted method is operable upon initial attach at or handover to a certain access network in question.
  • the 3GPP AAA Server receives an indication about a provisional trustworthiness of an access network, which provides packet data access for a roaming user, with respect to a visited network of said user from a non-3GPP access network, either via a 3GPP AAA proxy (using the STa and SWd interfaces, as presented in Figures 1 to 4 ) or via an ePDG (using the communication path represented by the dotted line in Figures 3 and 4 ).
  • This indication may for example be included in a Diameter Extensible Authentication Protocol request.
  • the applicability of local breakout or home routing for each subscribed access point name of said user is determined.
  • a decision is made about a final trustworthiness of said access network based upon the received provisional trustworthiness indication and the determined routing applicability for each access point name of the user in question.
  • the decision making in operation S703A further comprises accepting the provisional trustworthiness of said access network in terms of technical decision factors, and considering administrative decision factors, if any, for making an ultimate decision about the final trustworthiness of said access network.
  • the decision making further comprises discarding the provisional trustworthiness of said access network with respect to said visited network, and considering technical and, if any, administrative decision factors with respect to a home network of said user for making an ultimate decision about the final trustworthiness of said access network.
  • the decision making further comprises one of the following two options.
  • a first option (in operation S703C') sub-decisions for those subscribed access point names yielding the applicability of local breakout and for those access point names yielding the applicability of home routing are made, the sub-decisions made for both groups of access point names are combined such that said access network is decided to be finally trustworthy, when both groups of access point names are decided to be trustworthy.
  • a second option in operation S703C
  • the user is informed about the decisions of final trustworthiness of said access network (in operation S704).
  • a general trustworthiness information is provided (in case of S703A, S703B or S703C') or specific/separated information in respect to the individual subscribed access point names (in case of S703C").
  • the user is informed about these separate decisions about final trustworthiness of the access network, e.g. by way of a list of the access point names. This may for example be accomplished by using a correspondingly modified syntax of a AT_TRUST_IND attribute, or by using a specifically designated attribute.
  • Figure 8 shows a schematic flow chart of a method being executable at a visited network entity according to an exemplary embodiment of the present invention.
  • the visited network entity executing the thus depicted method may for example be a 3GPP AAA proxy, as depicted in Figures 1 to 4 above, or an ePDG, as depicted in Figures 3 and 4 above.
  • the thus depicted method is operable upon initial attach at or handover to a certain access network in question.
  • the AAA proxy in the case of the first alternative, presented in Figures 1 to 5
  • the ePDG in the case of the second alternative, presented in Figures 3 , 4 and 5
  • a decision is made about a trustworthiness of said access network with respect to said visited network based upon the evaluated trust relationship.
  • an indication about said decided trustworthiness is transmitted to a responsible network element of a home network of said user, e.g. an 3GPP AAA Server according to any one of Figures 1 to 4 .
  • the transmission of the indication may be performed in a Diameter Extensible Authentication Protocol request.
  • Figure 9 shows a schematic flow chart of a method being executable at a user equipment according to an exemplary embodiment of the present invention.
  • the user equipment executing the thus depicted method may for example be a UE, as implicit to Figures 1 , 2 above, or as depicted in Figures 3 and 4 above.
  • the thus depicted method is operable when the home network entity executes the second option for the case that the applicability of local breakout for some of the subscribed access point names of said user and the applicability of home routing for other subscribed access point names of said user is determined (i.e. operation S703C" according to Figure 7 above).
  • the user equipment receives information about separate decisions of trustworthiness of the non-3GPP access network, which provides packet data access for a roaming user, with respect to each individual subscribed access point name of the user in question from a network element of a home network of said user, e.g. a 3GPP AAA server. Then, in operation S902, packet data network connections are requested using the respective access point name, depending on the received trustworthiness of the access network, regarding the individual access point names.
  • the requesting of packet data network connections comprises for access point names, for which the access network was indicated to be trustworthy (in operation S902A), sending a packet data network (PDN) connection request to a non-3GPP gateway, if Proxy Mobile Internet Protocol is used, or setting up a security association and sending a PDN connection request to a packet data network gateway, if Dual-Stack Mobile Internet Protocol version 6 is used.
  • PDN packet data network
  • the requesting of packet data network connections comprises setting up a tunnel to an evolved packet data gateway (ePDG) and sending a packet data network connection (PDN) request via said tunnel to said evolved packet data gateway, if PMIP is used, or setting up a security association and sending a PDN connection request to the packet data network gateway via a secure tunnel to an ePDG (after a tunnel setup to ePDG, as necessary), if DSMIPv6 is used.
  • ePDG evolved packet data gateway
  • PDN packet data network connection
  • respective operations for distinguishing between the above-outlined cases may be explicitly carried out, such as for distinguishing between non-/trustworthiness for certain access point names, PMIP or DSMIPv6 usage (i.e. the IP mobility management protocol used), and the non-/existence of a secure tunnel to an ePDG (i.e. the need for setting up such a tunnel).
  • the solid line blocks are basically configured to perform the basic operations.
  • the entirety of solid line blocks are basically configured to perform the methods and operations as described above, respectively.
  • the individual blocks are meant to illustrate respective functional blocks implementing a respective function, process or procedure, respectively.
  • Such functional blocks are implementation-independent, i.e. may be implemented by means of any kind of hardware or software, respectively.
  • the lines/arrows interconnecting individual blocks are meant to illustrate an operational coupling there-between, which on the one hand is implementation-independent (e.g. wired or wireless) and on the other hand may also comprise an arbitrary number of intermediary functional entities not shown.
  • FIG 10 shows a schematic block diagram of a home network entity according to an exemplary embodiment of the present invention.
  • the thus depicted apparatus of a home network entity may for example be implemented as or in a 3GPP AAA server, as depicted in Figures 1 to 4 above.
  • the thus depicted apparatus of a home network entity comprises a receiver, a determiner, and a decider.
  • the receiver represents means for receiving an indication about a provisional trustworthiness of an access network with respect to a visited network of a user from a network element of said visited network (e.g. an AAA proxy or ePDG).
  • the determiner represents means for determining the applicability of local breakout (LBO) or home routing (HR) for each subscribed access point name of said user.
  • the decider represents means for deciding about a final trustworthiness of said access network based upon the received provisional trustworthiness indication from said receiver and the determined routing applicability for each subscribed access point name from said determiner.
  • the decider according to the embodiment of Figure 10 basically comprises three units, namely one for the determination that local breakout is applicable for all subscribed access point names of said user, one for the determination that home routing is applicable for all subscribed access point names of said user, and one for the determination that local breakout is applicable for some of the subscribed access point names of said user and home routing is applicable for other subscribed access point names of said user.
  • the decider is configured to accept the provisional trustworthiness of said access network in terms of technical decision factors (by means of an accepter), and to consider administrative decision factors, if any, for making an ultimate decision about the final trustworthiness of said access network (by means of a considerer).
  • the decider is configured to discard the provisional trustworthiness of said access network with respect to said visited network (by means of a discarder), and to consider technical and, if any, administrative decision factors with respect to a home network of said user for making an ultimate decision about the final trustworthiness of said access network (by means of a considerer).
  • the decider is configured to operate in one of two optional ways.
  • the decider may be configured to make sub-decisions for those subscribed access point names of said user yielding the applicability of local breakout and for those subscribed access point names of said user yielding the applicability of home routing (by means of a (sub-) decider), and to combine the sub-decisions made for both groups of access point names such that said access network is decided to be finally trustworthy, when the access network is decided to be trustworthy for both groups of access point names (by means of a combiner).
  • the decider may be configured to make separate decisions for those subscribed access point names of said user yielding the applicability of local breakout and for those access point names of said user yielding the applicability of home routing (by means of a (sub-) decider).
  • the user is informed about the final trustworthiness decision via an informer.
  • the decider is configured to make separate decisions for APNs yielding the applicability of local breakout and the APNs yielding home routing
  • the informer is capable of informing the user about these separate decisions about final trustworthiness of the access network, e.g. by way of a list of the access point names. This may for example be accomplished by using a correspondingly modified syntax of a AT_TRUST_IND attribute, or by using a specifically designated attribute.
  • the thus depicted apparatus of a home network entity comprises an interface to a visited network entity (e.g. AAA proxy or ePDG depending on the underlying network configuration). It may further comprise an interface to another home network entity (e.g. HSS, HLR, PCRF (Policy Charging Rules Function)).
  • a visited network entity e.g. AAA proxy or ePDG depending on the underlying network configuration
  • another home network entity e.g. HSS, HLR, PCRF (Policy Charging Rules Function)
  • FIG 11 shows a schematic block diagram of a visited network entity according to an exemplary embodiment of the present invention.
  • the thus depicted apparatus of a visited network entity may for example be implemented as or in a 3GPP AAA proxy, as depicted in Figures 1 to 4 above, or an ePDG, as depicted in Figures 3 and 4 above.
  • the thus depicted apparatus of a visited network entity comprises an evaluater, a decider, and a transmitter.
  • the evaluater represents means for evaluating a trust relationship between an access network and a visited network of a user by taking into account available decision factors for trustworthiness.
  • the decider represents means for deciding about a trustworthiness of said access network with respect to said visited network based upon the evaluated trust relationship.
  • the transmitter represents means for transmitting an indication about said decided trustworthiness to a network element of a home network of said user.
  • the thus depicted apparatus of a visited network entity comprises an interface to a home network entity (e.g. AAA server). It further comprises an interface to the relevant access network and/or the user equipment in question.
  • a home network entity e.g. AAA server
  • AAA server e.g. AAA server
  • Figure 12 shows a schematic block diagram of a user equipment according to an exemplary embodiment of the present invention.
  • the thus depicted apparatus of a user equipment may for example be implemented as or in a UE, as implicit to Figures 1 , 2 above, or as depicted in Figures 3 and 4 above.
  • the thus depicted apparatus of a user equipment comprises a receiver and a requester.
  • the receiver represents means for receiving information about separate decisions of trustworthiness of individual access point names of a user in question, which provides packet data access for a roaming user, from a network element of a home network of said user (e.g. AAA server).
  • the requester represents means for requesting packet data network connections using the respective access point names depending on the received trustworthiness of the access network regarding that individual access point name.
  • the requester according to the embodiment of Figure 12 is basically configured (by means of one or more respective senders) to send a PDN connection request to a non-3GPP gateway, if the access network was indicated to be trustworthy for the access point name in question and Proxy Mobile Internet Protocol is used as a protocol, and/or to set up a security association and send a PDN connection request to a packet data network gateway (directly, i.e. without involving an ePDG), if the access network was indicated to be trustworthy for the access point name in question and Dual-Stack Mobile Internet Protocol version 6 is used as IP mobility management protocol.
  • the requester is also configured to request a packet data network connection via a new tunnel setup and authentication to the ePDG (by the means of a sender (and an optional setter) ), if the access network was indicated to be not trustworthy regarding the access point name in question and PMIP is to be used, or to set up a tunnel to an ePDG, if such tunnel is not yet available, (by means of a setter) and subsequently to set up a secure association and to send a PDN connection request to a packet data network gateway via said tunnel to said ePDG (by means of a respective sender), if the access network was indicated to be not trustworthy regarding the access point name in question and DSMIPv6 is to be used.
  • the requester may comprise an access network checker for individual access point names representing means for checking the trustworthiness of the access network for the respective access point names in question.
  • the requester may comprise an IP mobility management protocol checker representing means for checking whether Proxy Mobile Internet Protocol (PMIP) or Dual-Stack Mobile Internet Protocol version 6 (DS-MIPv6) is used as a protocol.
  • PMIP Proxy Mobile Internet Protocol
  • DS-MIPv6 Dual-Stack Mobile Internet Protocol version 6
  • the requester may comprise (although not depicted) a tunnel checker representing means for checking whether or not a secure tunnel to an evolved packet gateway is already existing.
  • the thus depicted apparatus of a visited network entity comprises an interface to a home network entity (e.g. AAA server). It further comprises an interface to at least one of the above-mentioned non-3GPP gateway, PDN gateway, and ePDG for sending PDN and/or tunnel setup requests to an appropriate destination.
  • a home network entity e.g. AAA server
  • PDN gateway e.g. PDN gateway
  • ePDG e.g. PDN gateway
  • Any one of the above-outlined apparatuses represents an autonomous entity according to respective embodiments of the present invention, while their interworking entirety or any conceivable combination thereof represents a system according to respective embodiments of the present invention.
  • respective functional blocks or elements according to above-described aspects can be implemented by any known means, either in hardware and/or software, respectively, if it is only adapted to perform the described functions of the respective parts.
  • the mentioned method steps can be realized in individual functional blocks or by individual devices, or one or more of the method steps can be realized in a single functional block or by a single device.
  • any method step is suitable to be implemented as software or by hardware without changing the idea of the present invention.
  • Devices and means can be implemented as individual devices, but this does not exclude that they are implemented in a distributed fashion throughout the system, as long as the functionality of the device is preserved. Such and similar principles are to be considered as known to those skilled in the art.
  • Software in the sense of the present description comprises software code as such comprising code means for performing the respective functions, as well as software (or a computer program or a computer program product) embodied on a tangible medium such as a computer-readable storage medium having stored thereon a respective data structure or code portions or embodied in a signal or in a chip, potentially during processing thereof.
  • the present invention also covers any conceivable combination of method steps and operations described above, and any conceivable combination of nodes, apparatuses, modules or elements described above, as long as the above-described concepts of methodology and structural arrangement are applicable.
  • measures for trustworthiness decision making for access authentication for example relating to the trustworthiness of non-3GPP access networks within a 3GPP-compliant packet data system, exemplarily comprising receiving an indication about a provisional trustworthiness of an access network, which provides packet data access for a roaming user, with respect to a visited network of said user from a network element of said visited network, determining the applicability of local breakout or home routing for each subscribed access point name of said user, and deciding about a final trustworthiness of said access network based upon the received provisional trustworthiness indication and the determined routing applicability for each subscribed access point name of said user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

    Field of the invention
  • The present invention generally relates to trustworthiness decision making for access authentication. For example, the present invention relates to access authentication with respect to the trustworthiness of non-3GPP access networks within a 3GPP-compliant packet data system.
  • Background of the invention
  • In recent years, the convergence of communication systems and subsystems has attracted an increasing attention in communication technology. In this context, different systems in terms of communication technology, protocols, and/or principles as well as different subsystems thereof (e.g. access networks, core networks, or the like) are to be converged into an overall system framework. However, there are several issues in converging different systems and/or subsystems into a common overall system framework, and the operation of thus converged overall system frameworks.
  • One issue in the context of communication system convergence resides in the interworking between access networks and core networks. In such a system configuration, security issues may arise, for example the question of trustworthiness of an access network from the point of view of a core network or a user's home network or a user's visited network (in case of roaming).
  • In the following, a system configuration will exemplarily be addressed, in which a core network and/or home network and/or a visited network (in case of roaming) comply with a specific standard specification, for example a 3GPP (Third Generation Partnership Project) specification, but at least one access network via which a user equipment connects to the 3GPP core/home/visited network does not comply with a 3GPP standard specification. Such an access network is called a non-3GPP access network. It may comply with other standards, e.g. the HRPD standard defined by 3GPP2 or the WiMAX standard defined by the WiMAX Forum. It is to be noted that such a system configuration is taken as a non-limiting example, while similar system configurations are equally applicable as well.
  • As a non-limiting example for the following description, it is assumed that a user equipment is connected to a 3GPP evolved packet system (EPS) via a non-3GPP (e.g. HRPD (High Rate Packet Data) or WiMAX (Worldwide Interoperability for Microwave Access)) access network. Communication connectivity, e.g. Internet Protocol (IP) connectivity, is provided to the user equipment connecting to the EPC via the non-3GPP access networks in accordance with 3GPP standard specifications, such as 3GPP TS23.402 and 3GPP TS24.302. The security requirements and the requested authentication methods for trusted and untrusted non-3GPP access networks, as well as AAA (authentication, authorization and accounting) interfaces and procedures for the non-3GPP access network are also in accordance with 3GPP standard specifications, such as 3GPP TS33.402 and 3GPP TS29.273. Known authentication mechanisms such as EAP methods, e.g. EAP-AKA and EAP-AKA' (EAP: Extensible Authentication Protocol, AKA: Authentication and Key Agreement) are applicable in accordance with 3GPP standard specifications. In the present non-limiting example, it is also assumed that the user equipment is roaming, i.e. is connected to its home network via a non-3GPP access network, which is attached to a visited 3GPP-compliant network.
  • During initial attach or handover to a non-3GPP access network, a decision as to whether the access network is trusted or untrusted is to be made in the user's home network, for example by an AAA server residing in the HPLMN (home public land mobile network). This decision shall take into account business/ administrative conditions (e.g. direct roaming agreement with the operator of the access network) and technical conditions. Necessary or relevant technical conditions are dependent on the underlying network scenario and/or utilized protocols.
  • For example, according to current standard specifications, the following technical conditions are applicable for the S2a interface (between an access network and a packet data network gateway) using network-based mobility, i.e. Proxy Mobile IP (PMIP) as IP mobility management protocol. The MAG (Mobile Access Gateway) shall be trusted by the LMA (Local Mobility Anchor) to register only those Mobile Nodes that are attached. Security for PMIP messages between MAG and LMA shall be provided either by a chain of security associations in a hop-by-hop fashion (for each hop in such a chain, one security association per direction shall be used for all PMIP messages relating to any user), or by one security association per direction for all PMIP messages relating to any user in an end-to-end fashion for the intra-domain case. PMIP shall be used only in conjunction with EAP-AKA-based access authentication.
  • For example, according to current standard specifications, the following technical conditions are applicable for the S2c interface (between a user equipment and a packet data network gateway) using host-based mobility, i.e. Dual Stack Mobile IPv6 (DSMIPv6) as IP mobility management protocol. An access network needs to fulfill several security requirements to be trusted when host-based mobility is used. The trusted access will authenticate the user equipment and provide a secure link for the data to be transferred from the user equipment to the trusted access. The trusted access protects against source IP address spoofing. The trusted access and the packet data network gateway (PDN GW) will have a secure link between them to transfer the user's data across. The trusted access and the evolved packet core (EPC) need to co-ordinate when the user equipment detaches from the trusted access in order to ensure that the IP address that was assigned to the user equipment is not be used by another user equipment without EPC being aware of the change (i.e. enable the PDN GW to remove the CoA (care-of-address) binding for the old user equipment).
  • These sets of conditions, which are specified according to current standard specifications, are quite general, however, and additional information may be required to determine whether an access network is trusted or not. At present, it is up to each operator to determine a full set of business (administrative) and technical conditions which need to be met for an access network to be trusted. Therefore, in order that the making of a correct decision on the trustworthiness of an access network is feasible at the user's home network, all relevant information (for example, current data for all relevant conditions) need to be available at the home network. However, this will be particularly difficult to be ensured in a roaming case.
  • In this regard, it is to be noted that a packet data network gateway (PDN GW) may be dynamically allocated during an authentication procedure. Therefore, for example in terms of a condition of a secure IP link between a non-3GPP access gateway and the PDN GW, the IP link in question can be between the non-3GPP access network and the home network (in case home routing is selected, i.e. the PDN GW is located in the home network) or between the non-3GPP access network and the visited network (in case local breakout is selected, i.e. the PDN GW is located in the visited network).
  • Considering that the IP routing is made directly between the two networks (i.e. the access network and the home or visited network), the IP link may use different routes and different IP transport providers (e.g. network operators) for the cases of home routing and local breakout (LBO) case. Consequently, the security aspects concerning the respective IP links may also be different, thus hampering the availability of proper information for decision making at the home network.
  • According to current standard specifications, there is no mechanism as to how the home network could obtain all the relevant information needed to make its decision on the trust status (i.e. trustworthiness) of the access network, for example about the security of the IP link between the non-3GPP access network and the PDN GW that resides in the visited network, if local breakout is selected. Considering that there may be several hundred roaming partners e.g. for a GSM (Global System for Mobile Communication) and/or UTRAN (Universal Terrestrial Radio Access Network) network operator, which are scattered all over the world, and the number of non-3GPP accesses may be even higher, it is not feasible that the home network has up-to-date information about all IP links between all of the access networks and the potential visited networks, as required especially in roaming cases.
  • Therefore, the home network may make a wrong decision, not correctly taking into account all relevant conditions, e.g. the security of the link to be used. If the home network decides for the access network being untrusted, even though this would not be required, this will lead to unnecessary resource consumption and/or time delay. For example, an evolved packet data gateway (ePDG) may be unnecessarily involved in the communication path, and a tunnel setup procedure between user equipment and ePDG may be unnecessarily executed. In case the home network decides for the access network being trusted, even though there is e.g. no secure IP link between the access network and the visited network, this will lead to a break of confidentiality requirements, and thus e.g. eavesdropping may become possible.
  • Accordingly, there does not exist any feasible solution for ensuring secure and efficient access procedures based on the availability of information relating to the trustworthiness of access networks within a packet data system.
  • "On supporting trusted/untrusted access" 3GPP DRAFT; S2-083477 TRUSTED_UNTRUSTED_DP, SA WG2, no. Prague; 20080502, 2 May 2008 (2008-05-02), XP050265687 discloses handling trust information between a non-3GPP access network and a 3GPP access network. In a case in which a UE is roaming in such an access network, a VPLMN informs an HPLMN of trustworthiness of the access network and the HPLMN takes such input from the VPLMN into consideration when making a decision whether the access network is trusted or untrusted.
  • WO 2008/155066 relates to trust relationship detection between a core and an access network. A security tunnel establishment procedure is used to determine whether the access network is trusted or untrusted.
  • 3GPP; Technical Specification Group Core Network and Terminals; Evolved Packet System; 3GPP EPS AAA Interfaces (Release 8)", 3GPP DRAFT; 29273-120-RM, 21 November 2008 (2008-11-21), XP050314439, relates to 3GPP AAA reference points used by different non-3GPP accesses included in the Evolved Packet System (EPS).
  • 3GPP; Technical Specification Group Services and System Aspects; 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses;(Release 8)", 3GPP DRAFT; 33402_200, 19 December 2008 (2008-12-19), XP002545562, relates to the security architecture, the security feature groups, and the security mechanisms performed during inter working between non-3GPP accesses and the Evolved Packet System (EPS).
  • 3GPP; Technical Specification Group Core Network and Terminals; Access to the 3GPP Evolved Packet Core (EPC) via non-3GPP access networks; ), XP050310470, relates to the discovery and network selection procedures for access to 3GPP Evolved Packet Core (EPC) via non-3GPP access networks and includes Authentication and Access Authorization using Authentication, Authorization and Accounting (AAA) procedures used for the interworking of the 3GPP EPC and the non-3GPP access networks.
  • Summary of embodiments of the invention
  • The present invention and its embodiments are made to provide for a feasible solution for ensuring secure and efficient access procedures based on the availability of information relating to the trustworthiness of access networks within a packet data system.
  • This object is solved by a method having the features of claim 1, an apparatus having the features of claim 14 and a computer program product having the features of claim 15. Advantageous embodiments thereof are defined in the respective dependent claims.
  • Brief description of the drawings
  • In the following, the present invention will be described in greater detail by way of non-limiting examples with reference to the accompanying drawings, in which
    • Figure 1 shows a schematic block diagram of a network configuration in case of home routing using the S2a interface, in which embodiments of the present invention are applicable,
    • Figure 2 shows a schematic block diagram of a network configuration in case of local breakout using the S2a interface, in which embodiments of the present invention are applicable,
    • Figure 3 shows a schematic block diagram of a network configuration in case of home routing using the S2c interface, in which embodiments of the present invention are applicable,
    • Figure 4 shows a schematic block diagram of a network configuration in case of local breakout using the S2c interface, in which embodiments of the present invention are applicable,
    • Figure 5 shows a message flow diagram of an access authentication procedure in the network configuration of any one of Figures 1 to 4 according to an exemplary embodiment of the present invention,
    • Figure 6 shows a message flow diagram of an access authentication procedure in the network configuration of any one of Figure 3 or 4 according to an exemplary embodiment of the present invention,
    • Figure 7 shows a schematic flow chart of a method being executable at a home network entity according to an exemplary embodiment of the present invention,
    • Figure 8 shows a schematic flow chart of a method being executable at a visited network entity according to an exemplary embodiment of the present invention,
    • Figure 9 shows a schematic flow chart of a method being executable at a user equipment according to an exemplary embodiment of the present invention,
    • Figure 10 shows a schematic block diagram of a home network entity according to an exemplary embodiment of the present invention,
    • Figure 11 shows a schematic block diagram of a visited network entity according to an exemplary embodiment of the present invention, and
    • Figure 12 shows a schematic block diagram of a user equipment according to an exemplary embodiment of the present invention.
    Detailed description of embodiments of the present invention
  • The present invention is described herein with reference to particular non-limiting examples. A person skilled in the art will appreciate that the invention is not limited to these examples, and may be more broadly applied.
  • In particular, the present invention and its embodiments are mainly described in relation to 3GPP standard specifications being used as non-limiting examples for certain exemplary network configurations. In particular, non-3GPP access networks (ANs) in connection with 3GPP-compliant core networks (e.g. home and/or visited networks), i.e. a 3GPP evolved packet system, are used as a non-limiting example in this regard. As such, the description of the embodiments given herein specifically refers to terminology which is directly related thereto. Such terminology is only used in the context of the presented non-limiting examples, and does naturally not limit the invention in any way. Rather, any other network configuration or implementation may also be utilized as long as being in line with the features described herein.
  • In the following, various embodiments and implementations of the present invention and its aspects are described using several alternatives. It is generally to be noted that, according to certain needs and constraints, all of the described alternatives may be provided alone or in any conceivable combination (also including combinations of individual features of the various alternatives).
  • In most generic terms, in accordance with the illustrative examples outlined above, principles of the present invention are based on the visited (VPLMN: visited public land mobile network) network, e.g. the 3GPP AAA Proxy or the evolved packet data gateway (ePDG) therein, assessing the non-3GPP access network being trusted or untrusted and signaling this to the home (HPLMN) network, e.g. the 3GPP AAA server therein. This assumes that the HPLMN trusts the information provided by the VPLMN, but this trust between the HPLMN and the VPLMN may be assumed anyhow as the HPLMN has selected the VPLMN as a roaming partner. If local breakout (LBO) is selected during the authentication and authorization process, the AAA Server shall take into account the trusted/untrusted indication received from the VPLMN. This does not mean an automatic acceptance, namely the HPLMN operator shall have the right to make an "untrusted" decision even though the VPLMN has indicated a "trusted" decision and LBO is selected. One reason for that may be that the HPLMN and VPLMN operators have different judgments of the security ensured by a certain radio access type.
  • As a first alternative in line with the present invention, embodiments of the present invention may be implemented using an interface between a non-3GPP access network and the 3GPP AAA Proxy, which may be referred to as STa interface, and the interface between the 3GPP AAA Proxy and the 3GPP AAA Server, which can be referred to as SWd interface, in accordance with present exemplary network configurations. The so-called S2a/S2b/S2c interfaces shall be used for user plane communication, wherein this is decided by IP mobility mode selection (note that the S2b interface is used only, if a trust decision as explained below is "untrusted").
  • Figure 1 shows a schematic block diagram of a network configuration in case of home routing using the S2a interface, in which embodiments of the present invention are applicable.
  • According to Figure 1, non-3GPP access networks (for example, one being denoted as (potentially) trusted and one being denoted as untrusted) are connected to a home network HPLMN of a user (i.e. a user equipment) via a visited network VPLMN, which is due to the assumption of a roaming case. The roaming user equipment is not shown, but is provided with packet data access by any one of the thus depicted non-3GPP access networks. Since a home routing (HR) scenario is assumed in Figure 1, the PDN gateway is located in the home network. For further details of the thus depicted network configuration, reference is made to 3GPP TS 23.402.
  • Figure 2 shows a schematic block diagram of a network configuration in case of local breakout using the S2a interface, in which embodiments of the present invention are applicable.
  • According to Figure 2, a similar network configuration as that of Figure 1 is illustrated, but differs in that a local breakout (LBO) scenario is assumed. Hence, the PDN gateway is located in the visited network.
  • Figure 3 shows a schematic block diagram of a network configuration in case of home routing using the S2c interface, in which embodiments of the present invention are applicable.
  • According to Figure 3, non-3GPP access networks (for example, one being denoted as (potentially) trusted and one being denoted as untrusted) are connected to a home network HPLMN of a user (i.e. a user equipment) via a visited network VPLMN, which is due to the assumption of a roaming case. The roaming user equipment is provided with packet data access by any one of the thus depicted non-3GPP access networks. Since a home routing scenario is assumed in Figure 3, the PDN gateway is located in the home network. For further details of the thus depicted network configuration, reference is made to 3GPP TS 23.402.
  • Figure 4 shows a schematic block diagram of a network configuration in case of local breakout using the S2c interface, in which embodiments of the present invention are applicable.
  • According to Figure 4, a similar network configuration as that of Figure 3 is illustrated, but differs in that a local breakout (LBO) scenario is assumed. Hence, the PDN gateway is located in the visited network.
  • Figure 5 shows a message flow diagram of an access authentication procedure in the network configuration of any one of Figures 1 to 4 according to an exemplary embodiment of the present invention. For the following description, it is exemplarily assumed that the potentially trusted non-3GPP access network supports the EAP-AKA' authentication over the STa interface, as it is supposed to be for most of non-3GPP access networks that shall be handled as trusted by a 3GPP network.
  • Namely, Figure 5 shows details for an access authentication and authorization for an initial attach to a non-3GPP access network for a roaming case, using the STa and SWd interface. In the following, those aspects of the thus depicted access authentication are described in more details, which are relevant for embodiments of the present invention. For further details on the message contents and the actions executed by the individual network elements, reference is made to clause 5 of 3GPP TS 29.273 and clause 6.2 of TS 33.402.
  • The following description applies to procedures involving the STa interface, for which the use of EAP-AKA' is mandatory. (Note that the dotted lines in Figures 3 and 4 are not relevant here.)
  • In step 1, a connection is established between the user equipment UE and a "potentially trusted" non-3GPP access network (the decision is made during this process, see below), using a procedure specific to the non-3GPP access network (which is out of scope here). A roaming case is assumed here, i.e. the user is roaming in a foreign network. Therefore, the access network is connected to a visited network VPLMN (a roaming partner of the home network HPLMN). In step 2, an authenticator in the trusted non-3GPP access network sends an EAP Request/Identity to the UE. In step 3, the UE sends an EAP Response/Identity message, including a network access identifier (NAI). In step 4, the trusted non-3GPP access network generates a Diameter authentication and authorization request for EAP (e.g. DER: Diameter EAP Request) and includes (among others) the EAP response, the access type and the identity of the access network. The request is routed towards the proper AAA Proxy (i.e. to a proper VPLMN), based on the realm part of the NAI. In step 5, the AAA proxy shall include the visited network identifier (identifying the VPLMN) in the DER request.
  • According to embodiments of the present invention, the 3GPP AAA Proxy (in the VPLMN) provisionally determines the trustworthiness of the access network concerned, i.e. evaluates the trust relationship between the non-3GPP access network and the VPLMN. To this end, it uses the assumption that the PDN gateway shall be allocated in the VPLMN (due to the LBO scenario), while taking into account all information on the access network which is available in the VPLMN, e.g. the security level of the IP link between the access network and the VPLMN or the radio access technology (RAT) in the access network. The decision factors may be configured as part of the local policies in the AAA Proxy in the VPLMN. The result, i.e. the trusted/untrusted decision for the VPLMN shall be added to the forwarded DER request. This may be implemented by way of a specifically assigned attribute-value pair AVP (which could for example be denoted as "AN-Trusted AVP", wherein the possible values are "Trusted" and "Untrusted"). The DER request is then routed via the SWd interface to the proper 3GPP AAA Server in the HPLMN based on the realm part of the NAI.
  • In step 6, after the 3GPP AAA Server received the DER request that contains the EAP Response/Identity message, the subscriber identity and the radio access technology (RAT) over the SWd interface, it checks whether it has an unused authentication vector for EAP-AKA' and, if not, a set of new authentication vectors is retrieved from the home subscriber server HSS. In steps 7 to 10, the HSS generates authentication vectors and sends them to the 3GPP AAA server, the AAA Server stores the authentication vectors (if more then one was requested/received), the AAA Server retrieves the subscription data of the user, and the HSS sends the subscription data.
  • In step 11, the 3GPP AAA Server verifies that the subscriber is authorized to use the evolved packet system (EPS) and the non-3GPP access network. If the user is authorized, then, based on the received indicators (from the user equipment and the access network) and the subscription data (i.e. whether a fixed PDN GW is assigned to the UE, PDN GW allocation in the VPLMN is allowed or not), the AAA Server decides about the trustworthiness of the access network in question.
  • According to embodiments of the present invention, the 3GPP AAA Server in the HPLMN decides - for each subscribed access point name (APN) of the user - whether local breakout or home routing is to be used. It may allocate a PDN GW for (some of) the access point names. And, according to embodiments of the present invention, the 3GPP AAA Server in the HPLMN decides about whether the access network is to be handled as trusted or untrusted, i.e. about the final trustworthiness thereof.
  • To this end, the 3GPP AAA Server takes the VPLMN's provisional trustworthiness decision, i.e. the trustworthiness indication received from the VPLMN decision (e.g. the value of the AN-Trusted AVP) into consideration.
  • If local breakout is to be used for all access point names of the user, the AAA Server accepts the VPLMN's provisional decision in terms of technical decision factors. It may still decide for the access network being "untrusted", if there is a specific business-related (i.e. administrative) reason for doing so (e.g. due to previous subscriber complaints, limited trust with the VPLMN, etc.), but it shall not decide for the access network being "trusted", if the VPLMN indicated an "untrusted" state.
  • If home routing is to be used for all access point names of the user, the AAA Server shall not take into consideration the received VPLMN's provisional trust indication (because the relevant IP link shall be between the AN and the HPLMN, and not the VPLMN). That is, the VPLMN's provisional decision is discarded in this case, and a decision is made at the AAA Server in the home network on its own.
  • If LBO is allowed for some of the access point names of the user, but home routing is requested for access point names of the user, there are several options.
  • According to a first option, the AAA server makes sub-decisions separately for the local breakout and the home routing cases, i.e. for those access point names for which local breakout or home routing is applicable, which is accomplished as described above for the respective special cases, and then combines them into a single, joint decision for both groups. Namely, it decides for "trusted", only if both sub-decisions are "trusted". This option leads to the use of an evolved packet data gateway (ePDG) for all packet data network connections of the user in question, if this is needed at least for some access point names.
  • According to a second option, the AAA Server makes separate decisions for the local breakout and the home routing cases, i.e. for those subscribed access point names for which local breakout or home routing is applicable, which is accomplished as described above for the respective special cases. Then, if these decisions are different, the AAA Server indicates to the user equipment UE, for which access point names the access network is to be handled as trusted and for which access point names the access network is to be handled as untrusted.
  • For those subscribed access point names, for which the access network was decided to be trusted, the UE may send PDN connection requests to the non-3GPP gateway (if PMIP is used) or directly to the PDN GW (if DS-MIPv6 is used)., In order to request PDN connections for any of those APNs, for which the access network was decided to be untrusted, the UE shall firstly set up a tunnel to an ePDG, and then a corresponding PDN connection request shall be sent via this tunnel.
  • For this option, either a new attribute needs to be defined, or the syntax of the AT_TRUST_IND attribute needs to be extended so as to allow sending a list of access point names with respective trust indications.
  • In the context of the present invention and embodiments thereof, an access point name (APN) identifies a service provided by a packet data network, and is independent of the access network as such or any access point in the sense of an interface provided by an access network. A user's subscription profile, as stored in the HLR, contains data like the authorization to invoke some services (i.e. connect to some PDNs), and also whether for these, the LBO or home routing is to be used.
  • In step 12, the 3GPP AAA Server sends an EAP-AKA' authentication request (EAP Request/AKA'-Challenge message) included in a Diameter EAP Answer (e.g. DEA: Diameter EPA Answer) request. The 3GPP AAA Server informs the UE about the trust status of the access network in the AT_TRUST_IND attribute included in the EAP Request/AKA'-Challenge message. In step 13, the AAA proxy forwards the request to the non-3GPP AN, including an AKA' challenge. In step 14, the authenticator in the access network sends the EAP Request/AKA'-Challenge message to the UE. In step 15, the UE (the USIM (Universal Subscriber Identity Module) application) authenticates the network, computes the authentication response value and sends it in an EAP-Response message. In step 16, the authenticator in the access network sends the EAP Response/AKA'-Challenge packet to 3GPP AAA Proxy. In step 17, the AAA Proxy forwards the request to the AAA Server. In step 18, the AAA Server compares the received authentication result with the expected result (received within the authentication vector) and considers the authentication as successful, if they are equal. In step 19, if the authentication was successful, the AAA Server registers the user in the HSS. In step 20, the HSS acknowledges that the UE was registered. In step 21, the AAA Server sends a final DEA answer (indicating successful completion of the Diameter authentication process), including (among others) all the relevant APN-related data (which contains the PGN GW identity, if the AAA Server allocated a PDN GW or received it from the HSS, or if no PDN GW identity is sent, an indicator, whether the non-3GPP GW may allocate a PDN GW in the VPLMN, the selected IP mobility mode and EAP-Success information) to the AAA Proxy. In step 22, the AAA Proxy forwards the DEA request to the non-3GPP access network. In step 23, the authenticator in the access network informs the UE about the successfully completed authentication.
  • Subsequent steps after the access authentication (as described above) depend on the mobility mode and the trust indication as received by the UE. In particular, the UE shall act according to the received trusted/untrusted indication when requesting a PDN connection, as is detailed below.
  • As regards user traffic, if the STa interface and the EAP-AKA' authentication mechanism are used for authentication, the interface used for the user plane can be the S2a interface (when the decision is trusted and PMIP is used) or the S2b interface (when the decision is untrusted and PMIP is used; then, the UE shall need to set up a secure channel to the ePDG) or also the S2c interface (when DSMIP is used; the packets are sent to the PDN GW either directly - in case of trusted access - or through the ePDG - in case of untrusted access).
  • Above, an access authentication for an initial attach to an access network has been described in detail. The access authentication to be executed in case of a handover to a non-3GPP access network is similar to that for the initial attach. In fact, the differences (e.g. some PDN gateways may have already been allocated before the handover, and the AAA Server receives them from the HSS) do not need any different behavior in the particular operations according to embodiments of the present invention.
  • It is noted that the above-described scenarios using the STa interface build upon the assumption that the user equipment learns whether it is connected to a trusted access network before it initiates a setup of a PDN connection, e.g. by creating a DS-MIPv6 binding to the PDN gateway. In this regard, it is assumed that a trusted access network supports EAP, which is the pre-requisite for the use of EAP-AKA' between user equipment and AAA server.
  • However, if certain conditions are met, 3GPP standards allow that a non-3GPP access network can be trusted also without supporting EAP methods and specifically, EAP-AKA' (as has been assumed above). For this type of (potentially) trusted access networks, only host-based mobility is applicable, and the STa interface is not applicable for authentication. For this specific type of non-3GPP access networks, the UE will not be informed about the trustworthiness of the non-3GPP access network and unless it has preconfigured information about the specific access network to be handled as trusted, it shall treat it (at least initially, until it gains such information) as untrusted. For this case, the first alternative described above cannot be used; a specific solution, which is described in the following, is needed.
  • As a second alternative in line with the present invention, embodiments of the present invention may be implemented using a new path for the authentication messaging, as presented as thick dotted line in Figures 3 and 4.
  • In both of these figures, there is illustrated a thick dotted line ranging from the user equipment to the 3GPP AAA Server in the home network, passing through a trusted access network as well as the evolved packet data gateway ePDG and the 3GPP AAA Proxy in the visited network. This thick dotted line represents a specific message route according to embodiments of the present invention. Namely, according to exemplary embodiments for the special case of a trusted non-3GPP access network without EAP support, the trusted non-3GPP access gateway may be connected (at least temporarily, for the authentication) with the ePDG.
  • The above-mentioned special case builds the basis for the present second alternative in line with the present invention. Namely, the following scenarios build upon the assumption that a non-3GPP access network is trusted, but does not support EAP, and the UE has no preconfigured information about the access network to be handled as trusted. For this specific case, the UE shall initiate the setup of a secure tunnel to an ePDG, before requesting any PDN connection. In fact, the UE does so, while it is attached to a trusted - or at least "potentially trusted" - non-3GPP access network. This results in the communication path represented by the thick dotted line in Figures 3 and 4.
  • Figure 6 shows a message flow diagram of an access authentication procedure in the network configuration of any one of Figures 3 and 4 according to an exemplary embodiment of the present invention, when this new communication path is used.
  • Figure 6 shows details for an access authentication and authorization for an initial attach to a non-3GPP access network, which is equally applicable for a handover. In the following, those aspects of the thus depicted access authentication are described in more details, which are relevant for embodiments of the present invention. For further details on the message contents and the actions executed by the individual network elements, reference is made to clause 8.2.2 of 3GPP TS 33.402.
  • In step 1, the UE and the ePDG exchange the first pair of messages, known as IKE_SA_INIT, in which the ePDG and UE negotiate cryptographic algorithms, exchange nonces and perform a Diffie_Hellman exchange. In step 2, the UE sends the user identity and the APN information in this first message of the IKE_AUTH phase, and begins negotiation of child security associations. The UE omits the AUTH parameter in order to indicate to the ePDG that it wants to use EAP over IKEv2 (Internet Key Exchange version 2). The user identity shall be compliant with Network Access Identifier (NAI) format, containing the IMSI or the pseudonym. The UE shall send the configuration payload (CFG_REQUEST) within the IKE_AUTH request message to obtain a remote IP Address. In steps 3 and 4, the ePDG sends the Authentication Request message with an EAP AVP to the 3GPP AAA Server via the 3GPP AAA Proxy, containing the user identity, APN information, an ePDG selection parameter, and a (provisional) trustworthiness indication of the access network in question. The ePDG shall include a parameter indicating that the authentication is being performed for tunnel establishment with an ePDG. This will help the 3GPP AAA Server distinguish among authentications for trusted access or tunnel setup for I-WLAN (Interworking Wireless Local Area Network)..
  • According to embodiments of the present invention, in step 3, the ePDG (in the VPLMN) provisionally determines the trustworthiness of the access network concerned, i.e. evaluates the trust relationship between the non-3GPP access network and the VPLMN. To this end, it uses the assumption that the PDN gateway shall be allocated in the VPLMN (due to the LBO scenario), while taking into account all information on the access network which is available in the VPLMN, e.g. the security level of the IP link between the access network and the VPLMN or the radio access technology (RAT) in the access network. The decision factors may be configured as part of the local policies in the ePDG in the VPLMN. The result, i.e. the trusted/untrusted decision for the VPLMN shall be added to the forwarded (DER) authentication request. This may be implemented by way of a specifically assigned attribute-value pair AVP (which could for example be denoted as "AN-Trusted AVP", wherein the possible values are "Trusted" and "Untrusted"). The (DER) authentication request is then routed to the proper 3GPP AAA Proxy, which in turn forwards it to the 3GPP AAA Server in the HPLMN based on the realm part of the NAI.
  • In step 5, the 3GPP AAA Server shall fetch the user profile and authentication vectors from the home subscriber server HSS and/or home location register HLR (if these parameters are not available in the 3GPP AAA Server). The 3GPP AAA Server shall include the parameter received in step 4 indicating that the authentication is being performed for tunnel establishment with an ePDG in the request to the HSS. The HSS shall then generate authentication vectors with AMF separation bit = 0 and send them back to the 3GPP AAA server. The 3GPP AAA server shall also fetch the user profile (if it is not yet available there) and, based on that, it shall decide for each subscribed APN (access point name) of the user, whether home routing or local breakout is to be used, i.e. whether the PDN gateway can be allocated in the VPLMN or HPLMN. Subsequent to that, if the AAA server has received information from the ePDG that the access network is trusted by the VPLMN, the AAA server shall decide about the access network to be handled as trusted or untrusted. (Note that without receiving the trust indication from the VPLMN, no such decision is needed, as the access network is always considered to be untrusted if the ePDG is involved in the access authentication.)
  • According to embodiments of the present invention, the 3GPP AAA Server in the HPLMN decides about whether the access network is to be handled as trusted or untrusted, i.e. about the final trustworthiness thereof.
  • To this end, the 3GPP AAA Server takes the VPLMN's provisional trustworthiness decision, i.e. the trustworthiness indication received from the VPLMN decision (e.g. the value of the AN-Trusted AVP) into consideration. Similar to the above alternative using the STa interface, it is distinguished between the three cases that local breakout is to be used for all access point names, home routing is to be used for all access point names, and LBO is allowed for some of the access point names of the user, but home routing is requested for access point names of the user. Also the decision making and the feasible options are similar to those described above in connection with the STa interface. Thus, details (cf. step 11 according to Figure 5) are not repeated here for the sake of brevity.
  • After the AAA server has determined that the access network is trusted indeed (this means trusted for all APNs for the first option, or at least for some of the subscribed APNs for the second option), the AAA server shall include the AT_TRUST_IND attribute (or, in case of the second option, the new attribute, if that will be used for encoding the decision) in the EAP Request/AKA-Challenge message.
  • In step 6, the 3GPP AAA Server initiates the authentication challenge. The user identity is not requested again. The trust indication as determined above is included in the request. In step 7, the 3GPP AAA Proxy forwards the request to the ePDG. In step 8, the ePDG responds to the UE with its identity, a certificate, and sends the AUTH parameter to protect the previous message it sent to the UE (in the IKE_SA_INIT exchange). It completes the negotiation of the child security associations as well. The EAP message received from the 3GPP AAA Server (EAP-Request/AKA-Challenge) is included in order to start the EAP procedure over IKEv2. In step 9, the UE checks the authentication parameters and responds to the authentication challenge. The only payload (apart from the header) in the IKEv2 message is the EAP message.
  • For the first option, if the UE receives the EAP Request/AKA-Challenge message with the AT_TRUST_IND attribute included and indicating that the access network is trusted, the UE may decide to abort the IKEv2 procedure. If the UE aborts the IKEv2 procedure, the UE shall then initiate a DS-MIPv6 binding to the PDN gateway, without involving the ePDG. Otherwise, the UE continues with the standard procure which is omitted from Figure 6.
  • For the second option, if the UE receives the EAP-Request/AKA-challenge message with the AT_TRUST_IND attribute (or the relevant new attribute if that is chosen for encoding the access network trust indication) included and indicating that the access network is trusted for some of the subscribed APNs but not for all of them, the UE shall complete the IKEv2 authentication procedure and set up a secure tunnel to the ePDG. Subsequent to that, the UE shall behave for each APN specifically. When the UE initiates a setup of PDN connections to an APN, for which the access network was indicated as untrusted, the UE shall set up a DS-MIPv6 binding to the PDN gateway via the ePDG (i.e. use the secure tunnel). When the UE initiates a setup of a PDN connection to an APN, for which the AN was indicated as trusted, the UE may set up a DS-MIPv6 binding to the PDN gateway directly, without involving the ePDG.
  • In fact, the ePDG may have several sources available to decide whether an access network should be considered trusted e.g. the security level of the IP link between the access network and the VPLMN or the radio access technology in the access network. The decision factors shall be configured as part of the local policies in the ePDG. This is similar to the process described for the AAA proxy in the case of the S2a interface, with the ePDG here taking the role of the AAA proxy.
  • As regards user traffic, if the STa interface and the EAP-AKA' authentication mechanism are not used for authentication, the interface used for the user plane can be the S2c interface going directly to the PDN GW, if the final trustworthiness decision is "trusted", or via the ePDG, if the final trustworthiness decision is "untrusted". If a separate decision is made for the APNs yielding local breakout and those yielding home routing, the S2c interface shall have different paths for these groups of APNs.
  • While alternatives and embodiments of the present invention have previously been described from an overall system's point of view, while specifically considering the interworking between individual entities, details about the individual methods and entities will be described herein below.
  • Figure 7 shows a schematic flow chart of a method being executable at a home network entity according to an exemplary embodiment of the present invention. The home network entity executing the thus depicted method may for example be a 3GPP AAA server, as depicted in Figures 1 to 4 above. The thus depicted method is operable upon initial attach at or handover to a certain access network in question.
  • According to the method of Figure 7, in operation S701, the 3GPP AAA Server receives an indication about a provisional trustworthiness of an access network, which provides packet data access for a roaming user, with respect to a visited network of said user from a non-3GPP access network, either via a 3GPP AAA proxy (using the STa and SWd interfaces, as presented in Figures 1 to 4) or via an ePDG (using the communication path represented by the dotted line in Figures 3 and 4). This indication may for example be included in a Diameter Extensible Authentication Protocol request. Then, in operation S702, the applicability of local breakout or home routing for each subscribed access point name of said user is determined. In operation S703, a decision is made about a final trustworthiness of said access network based upon the received provisional trustworthiness indication and the determined routing applicability for each access point name of the user in question.
  • In operation S703, when the determining yields the applicability of local breakout for all subscribed access point names of the user in question, the decision making (in operation S703A) further comprises accepting the provisional trustworthiness of said access network in terms of technical decision factors, and considering administrative decision factors, if any, for making an ultimate decision about the final trustworthiness of said access network.
  • In operation S703, when the determining yields the applicability of home routing for all subscribed access point names of the user in question, the decision making (in operation S703B) further comprises discarding the provisional trustworthiness of said access network with respect to said visited network, and considering technical and, if any, administrative decision factors with respect to a home network of said user for making an ultimate decision about the final trustworthiness of said access network.
  • In operation S703, when the determining yields the applicability of local breakout for some of the subscribed access point names of the user in question and the applicability of home routing for other subscribed access point names of the user in question, the decision making (in operation S703C) further comprises one of the following two options. In a first option (in operation S703C') sub-decisions for those subscribed access point names yielding the applicability of local breakout and for those access point names yielding the applicability of home routing are made, the sub-decisions made for both groups of access point names are combined such that said access network is decided to be finally trustworthy, when both groups of access point names are decided to be trustworthy. In a second option (in operation S703C") separate decisions for those access point names yielding the applicability of local breakout and for those access point names yielding the applicability of home routing are made.
  • Subsequently, the user is informed about the decisions of final trustworthiness of said access network (in operation S704). Here, either a general trustworthiness information is provided (in case of S703A, S703B or S703C') or specific/separated information in respect to the individual subscribed access point names (in case of S703C"). If separate decisions are made for APNs yielding the applicability of local breakout and the APNs yielding home routing, the user is informed about these separate decisions about final trustworthiness of the access network, e.g. by way of a list of the access point names. This may for example be accomplished by using a correspondingly modified syntax of a AT_TRUST_IND attribute, or by using a specifically designated attribute.
  • Figure 8 shows a schematic flow chart of a method being executable at a visited network entity according to an exemplary embodiment of the present invention. The visited network entity executing the thus depicted method may for example be a 3GPP AAA proxy, as depicted in Figures 1 to 4 above, or an ePDG, as depicted in Figures 3 and 4 above. The thus depicted method is operable upon initial attach at or handover to a certain access network in question.
  • According to the method of Figure 8, in operation S801, the AAA proxy (in the case of the first alternative, presented in Figures 1 to 5) or the ePDG (in the case of the second alternative, presented in Figures 3, 4 and 5) evaluates a trust relationship between an access network, which provides packet data access for a roaming user, and a visited network of said user by taking into account available decision factors for trustworthiness. Then, in operation S802, a decision is made about a trustworthiness of said access network with respect to said visited network based upon the evaluated trust relationship. In operation S803, an indication about said decided trustworthiness is transmitted to a responsible network element of a home network of said user, e.g. an 3GPP AAA Server according to any one of Figures 1 to 4. The transmission of the indication may be performed in a Diameter Extensible Authentication Protocol request.
  • Figure 9 shows a schematic flow chart of a method being executable at a user equipment according to an exemplary embodiment of the present invention. The user equipment executing the thus depicted method may for example be a UE, as implicit to Figures 1, 2 above, or as depicted in Figures 3 and 4 above. The thus depicted method is operable when the home network entity executes the second option for the case that the applicability of local breakout for some of the subscribed access point names of said user and the applicability of home routing for other subscribed access point names of said user is determined (i.e. operation S703C" according to Figure 7 above).
  • According to the method of Figure 9, in operation S901, the user equipment receives information about separate decisions of trustworthiness of the non-3GPP access network, which provides packet data access for a roaming user, with respect to each individual subscribed access point name of the user in question from a network element of a home network of said user, e.g. a 3GPP AAA server. Then, in operation S902, packet data network connections are requested using the respective access point name, depending on the received trustworthiness of the access network, regarding the individual access point names.
  • In operation S902, the requesting of packet data network connections comprises for access point names, for which the access network was indicated to be trustworthy (in operation S902A), sending a packet data network (PDN) connection request to a non-3GPP gateway, if Proxy Mobile Internet Protocol is used, or setting up a security association and sending a PDN connection request to a packet data network gateway, if Dual-Stack Mobile Internet Protocol version 6 is used. For access point names, for which the access network was indicated to be non-trustworthy (in operation S902B), the requesting of packet data network connections comprises setting up a tunnel to an evolved packet data gateway (ePDG) and sending a packet data network connection (PDN) request via said tunnel to said evolved packet data gateway, if PMIP is used, or setting up a security association and sending a PDN connection request to the packet data network gateway via a secure tunnel to an ePDG (after a tunnel setup to ePDG, as necessary), if DSMIPv6 is used.
  • It is noted that in case of DSMIP and untrusted access, there needs to be only one tunnel to the ePDG and this shall be set up before sending the first binding request to a PDN gateway. For PMIP, a separate tunnel is created for each PDN connection/access point name.
  • As depicted in Figure 9, respective operations for distinguishing between the above-outlined cases may be explicitly carried out, such as for distinguishing between non-/trustworthiness for certain access point names, PMIP or DSMIPv6 usage (i.e. the IP mobility management protocol used), and the non-/existence of a secure tunnel to an ePDG (i.e. the need for setting up such a tunnel).
  • Although in the foregoing embodiments of the present invention have been described mainly with reference to methods, procedures and functions, corresponding embodiments of the present invention also cover respective apparatuses, network nodes, including both software and/or hardware thereof.
  • Respective exemplary embodiments of the present invention are described below referring to Figures 10 to 12, while for the sake of brevity reference is made to the detailed description of respective corresponding methods and operations according to Figures 5 to 9, respectively.
  • In Figures 10 to 12 below, the solid line blocks are basically configured to perform the basic operations. The entirety of solid line blocks are basically configured to perform the methods and operations as described above, respectively. With respect to Figures 10 to 12, it is to be noted that the individual blocks are meant to illustrate respective functional blocks implementing a respective function, process or procedure, respectively. Such functional blocks are implementation-independent, i.e. may be implemented by means of any kind of hardware or software, respectively. The lines/arrows interconnecting individual blocks are meant to illustrate an operational coupling there-between, which on the one hand is implementation-independent (e.g. wired or wireless) and on the other hand may also comprise an arbitrary number of intermediary functional entities not shown.
  • Further, in Figures 10 to 12, only those functional blocks are illustrated, which relate to any one of the above-described methods, procedures and functions. A skilled person is deemed to acknowledge the presence of any other conventional functional blocks required for an operation of respective structural arrangements, such as e.g. a power supply, a central processing unit, respective memories or the like.
  • Figure 10 shows a schematic block diagram of a home network entity according to an exemplary embodiment of the present invention. The thus depicted apparatus of a home network entity may for example be implemented as or in a 3GPP AAA server, as depicted in Figures 1 to 4 above.
  • According to the exemplary embodiment depicted in Figure 10, the thus depicted apparatus of a home network entity comprises a receiver, a determiner, and a decider.
  • Stated in general terms, the receiver represents means for receiving an indication about a provisional trustworthiness of an access network with respect to a visited network of a user from a network element of said visited network (e.g. an AAA proxy or ePDG). The determiner represents means for determining the applicability of local breakout (LBO) or home routing (HR) for each subscribed access point name of said user. The decider represents means for deciding about a final trustworthiness of said access network based upon the received provisional trustworthiness indication from said receiver and the determined routing applicability for each subscribed access point name from said determiner. The decider according to the embodiment of Figure 10 basically comprises three units, namely one for the determination that local breakout is applicable for all subscribed access point names of said user, one for the determination that home routing is applicable for all subscribed access point names of said user, and one for the determination that local breakout is applicable for some of the subscribed access point names of said user and home routing is applicable for other subscribed access point names of said user.
  • For the first-mentioned case, the decider is configured to accept the provisional trustworthiness of said access network in terms of technical decision factors (by means of an accepter), and to consider administrative decision factors, if any, for making an ultimate decision about the final trustworthiness of said access network (by means of a considerer).
  • For the second-mentioned case, the decider is configured to discard the provisional trustworthiness of said access network with respect to said visited network (by means of a discarder), and to consider technical and, if any, administrative decision factors with respect to a home network of said user for making an ultimate decision about the final trustworthiness of said access network (by means of a considerer).
  • For the third-mentioned case, the decider is configured to operate in one of two optional ways. On the one hand, the decider may be configured to make sub-decisions for those subscribed access point names of said user yielding the applicability of local breakout and for those subscribed access point names of said user yielding the applicability of home routing (by means of a (sub-) decider), and to combine the sub-decisions made for both groups of access point names such that said access network is decided to be finally trustworthy, when the access network is decided to be trustworthy for both groups of access point names (by means of a combiner). On the other hand, the decider may be configured to make separate decisions for those subscribed access point names of said user yielding the applicability of local breakout and for those access point names of said user yielding the applicability of home routing (by means of a (sub-) decider).
  • The user is informed about the final trustworthiness decision via an informer. If the decider is configured to make separate decisions for APNs yielding the applicability of local breakout and the APNs yielding home routing, the informer is capable of informing the user about these separate decisions about final trustworthiness of the access network, e.g. by way of a list of the access point names. This may for example be accomplished by using a correspondingly modified syntax of a AT_TRUST_IND attribute, or by using a specifically designated attribute.
  • The thus depicted apparatus of a home network entity comprises an interface to a visited network entity (e.g. AAA proxy or ePDG depending on the underlying network configuration). It may further comprise an interface to another home network entity (e.g. HSS, HLR, PCRF (Policy Charging Rules Function)).
  • Figure 11 shows a schematic block diagram of a visited network entity according to an exemplary embodiment of the present invention. The thus depicted apparatus of a visited network entity may for example be implemented as or in a 3GPP AAA proxy, as depicted in Figures 1 to 4 above, or an ePDG, as depicted in Figures 3 and 4 above.
  • According to the exemplary embodiment depicted in Figure 11, the thus depicted apparatus of a visited network entity comprises an evaluater, a decider, and a transmitter.
  • Stated in general terms, the evaluater represents means for evaluating a trust relationship between an access network and a visited network of a user by taking into account available decision factors for trustworthiness. The decider represents means for deciding about a trustworthiness of said access network with respect to said visited network based upon the evaluated trust relationship. The transmitter represents means for transmitting an indication about said decided trustworthiness to a network element of a home network of said user.
  • The thus depicted apparatus of a visited network entity comprises an interface to a home network entity (e.g. AAA server). It further comprises an interface to the relevant access network and/or the user equipment in question.
  • Figure 12 shows a schematic block diagram of a user equipment according to an exemplary embodiment of the present invention. The thus depicted apparatus of a user equipment may for example be implemented as or in a UE, as implicit to Figures 1, 2 above, or as depicted in Figures 3 and 4 above.
  • According to the exemplary embodiment depicted in Figure 12, the thus depicted apparatus of a user equipment comprises a receiver and a requester.
  • Stated in general terms, the receiver represents means for receiving information about separate decisions of trustworthiness of individual access point names of a user in question, which provides packet data access for a roaming user, from a network element of a home network of said user (e.g. AAA server). The requester represents means for requesting packet data network connections using the respective access point names depending on the received trustworthiness of the access network regarding that individual access point name.
  • The requester according to the embodiment of Figure 12 is basically configured (by means of one or more respective senders) to send a PDN connection request to a non-3GPP gateway, if the access network was indicated to be trustworthy for the access point name in question and Proxy Mobile Internet Protocol is used as a protocol, and/or to set up a security association and send a PDN connection request to a packet data network gateway (directly, i.e. without involving an ePDG), if the access network was indicated to be trustworthy for the access point name in question and Dual-Stack Mobile Internet Protocol version 6 is used as IP mobility management protocol. The requester is also configured to request a packet data network connection via a new tunnel setup and authentication to the ePDG (by the means of a sender (and an optional setter) ), if the access network was indicated to be not trustworthy regarding the access point name in question and PMIP is to be used, or to set up a tunnel to an ePDG, if such tunnel is not yet available, (by means of a setter) and subsequently to set up a secure association and to send a PDN connection request to a packet data network gateway via said tunnel to said ePDG (by means of a respective sender), if the access network was indicated to be not trustworthy regarding the access point name in question and DSMIPv6 is to be used.
  • For distinguishing the above-mentioned cases of network trustworthiness, the requester may comprise an access network checker for individual access point names representing means for checking the trustworthiness of the access network for the respective access point names in question. For distinguishing the above-mentioned cases of protocols being used, the requester may comprise an IP mobility management protocol checker representing means for checking whether Proxy Mobile Internet Protocol (PMIP) or Dual-Stack Mobile Internet Protocol version 6 (DS-MIPv6) is used as a protocol. It is noted that these protocols are mentioned as non-limiting examples, while any other protocols may be equally used, as far as applicable for underlying network configurations. For distinguishing the above-mentioned cases of the non-/existence of a tunnel to a relevant ePDG, the requester may comprise (although not depicted) a tunnel checker representing means for checking whether or not a secure tunnel to an evolved packet gateway is already existing.
  • The thus depicted apparatus of a visited network entity comprises an interface to a home network entity (e.g. AAA server). It further comprises an interface to at least one of the above-mentioned non-3GPP gateway, PDN gateway, and ePDG for sending PDN and/or tunnel setup requests to an appropriate destination.
  • Any one of the above-outlined apparatuses represents an autonomous entity according to respective embodiments of the present invention, while their interworking entirety or any conceivable combination thereof represents a system according to respective embodiments of the present invention.
  • In general, it is to be noted that respective functional blocks or elements according to above-described aspects can be implemented by any known means, either in hardware and/or software, respectively, if it is only adapted to perform the described functions of the respective parts. The mentioned method steps can be realized in individual functional blocks or by individual devices, or one or more of the method steps can be realized in a single functional block or by a single device.
  • Generally, any method step is suitable to be implemented as software or by hardware without changing the idea of the present invention. Devices and means can be implemented as individual devices, but this does not exclude that they are implemented in a distributed fashion throughout the system, as long as the functionality of the device is preserved. Such and similar principles are to be considered as known to those skilled in the art.
  • Software in the sense of the present description comprises software code as such comprising code means for performing the respective functions, as well as software (or a computer program or a computer program product) embodied on a tangible medium such as a computer-readable storage medium having stored thereon a respective data structure or code portions or embodied in a signal or in a chip, potentially during processing thereof.
  • Generally, for the purpose of the present invention as described herein above, it should be noted that
    • an access technology may be any technology by means of which a user equipment can access an access network (e.g. via a base station or generally an access node). Any present or future technology, such as WLAN (Wireless Local Access Network), WiMAX (Worldwide Interoperability for Microwave Access), BlueTooth, Infrared, and the like may be used; although the above technologies are mostly wireless access technologies, e.g. in different radio spectra, access technology in the sense of the present invention may also imply wirebound technologies, e.g. IP based access technologies like cable networks or fixed lines but also circuits switched access technologies; access technologies may be distinguishable in at least two categories or access domains such as packet switched and circuit switched, but the existence of more than two access domains does not impede the invention being applied thereto,
    • an access network may be any device, apparatus, unit or means by which a station, entity or other user equipment may connect to and/or utilize services offered by the access network; such services include, among others, data and/or (audio-) visual communication, data download etc.;
    • a user equipment may be any device, apparatus, unit or means by which a system user may experience services from an access network such as a mobile phone, personal digital assistant PDA, or computer;
    • method steps and functions likely to be implemented as software code portions and being run using a processor at one of the entities, a network element, or a terminal (as examples of devices, apparatuses and/or modules thereof, or as examples of entities including apparatuses and/or modules therefor), are software code independent and can be specified using any known or future developed programming language, such as e.g. Java, C++, C, and Assembler, as long as the functionality defined by the method steps is preserved;
    • generally, any method step is suitable to be implemented as software or by hardware without changing the idea of the invention in terms of the functionality implemented;
    • method steps, functions, and/or devices, apparatuses, units or means likely to be implemented as hardware components at a terminal or network element, or any module(s) thereof, are hardware independent and can be implemented using any known or future developed hardware technology or any hybrids of these, such as MOS (Metal Oxide Semiconductor), CMOS (Complementary MOS), BiMOS (Bipolar MOS), BiCMOS (Bipolar CMOS), ECL (Emitter Coupled Logic), TTL (Transistor-Transistor Logic), etc., using for example ASIC (Application Specific IC (Integrated Circuit)) components, FPGA (Field-programmable Gate Arrays) components, CPLD (Complex Programmable Logic Device) components or DSP (Digital Signal Processor) components; in addition, any method steps and/or devices, units or means likely to be implemented as software components may for example be based on any security architecture capable e.g. of authentication, authorization, keying and/or traffic protection;
    • devices, apparatuses, units or means can be implemented as individual devices, apparatuses, units or means, but this does not exclude that they are implemented in a distributed fashion throughout the system, as long as the functionality of the device, apparatus, unit or means is preserved,
    • an apparatus may be represented by a semiconductor chip, a chipset, or a (hardware) module comprising such chip or chipset; this, however, does not exclude the possibility that a functionality of an apparatus or module, instead of being hardware implemented, be implemented as software in a (software) module such as a computer program or a computer program product comprising executable software code portions for execution/being run on a processor;
    • a device may be regarded as an apparatus or as an assembly of more than one apparatus, whether functionally in cooperation with each other or functionally independently of each other but in a same device housing, for example.
  • The present invention also covers any conceivable combination of method steps and operations described above, and any conceivable combination of nodes, apparatuses, modules or elements described above, as long as the above-described concepts of methodology and structural arrangement are applicable.
  • There are provided measures for trustworthiness decision making for access authentication, for example relating to the trustworthiness of non-3GPP access networks within a 3GPP-compliant packet data system, exemplarily comprising receiving an indication about a provisional trustworthiness of an access network, which provides packet data access for a roaming user, with respect to a visited network of said user from a network element of said visited network, determining the applicability of local breakout or home routing for each subscribed access point name of said user, and deciding about a final trustworthiness of said access network based upon the received provisional trustworthiness indication and the determined routing applicability for each subscribed access point name of said user.
  • Even though the invention is described above with reference to the examples according to the accompanying drawings, it is to be understood that the invention is not restricted thereto. Rather, it is apparent to those skilled in the art that the present invention can be modified in many ways without departing from the scope of the inventive idea as disclosed herein.

Claims (15)

  1. A method comprising
    a home network device receiving (S701) an indication about a provisional trustworthiness of an access network, which provides packet data access for a roaming user, with respect to a visited network of said user from a network element of said visited network,
    characterized in that
    the home network device determines (S702) the applicability of local breakout or home routing for each subscribed access point name of said user, and
    the home network device decides about a final trustworthiness based upon the received provisional trustworthiness indication and the determined routing applicability for each subscribed access point name of said user.
  2. The method according to claim 1, wherein said receiving of the provisional trustworthiness indication comprises receiving an attribute in an authentication request, which is configured to indicate the provisional trustworthiness of said access network.
  3. The method according to claim 2, wherein the authentication request comprises a Diameter Extensible Authentication Protocol request.
  4. The method according to any one of claims 1 to 3, wherein said determining yields the applicability of local breakout for all subscribed access point names of said user, said deciding further comprising
    accepting the provisional trustworthiness of said access network in terms of technical decision factors, and
    considering administrative decision factors, if any, for making an ultimate decision about the final trustworthiness of said access network.
  5. The method according to any one of claims 1 to 3, wherein said determining yields the applicability of home routing for all subscribed access point names of said user, said deciding further comprising
    discarding the provisional trustworthiness of said access network with respect to said visited network, and
    considering technical and, if any, administrative decision factors with respect to a home network of said user for making an ultimate decision about the final trustworthiness of said access network.
  6. The method according to claim 4 or 5, wherein said decision factors comprise technical decision factors including one or more of a radio access technology of said access network and a security level of a link between said access network and said visited network of said user, as well as administrative decision factors including one or more of the existence of a roaming agreement between said access network and said home network, a trust level between said visited network and said home network, previous experience on service quality.
  7. The method according to any one of claims 1 to 3, wherein said determining yields the applicability of local breakout for some of the subscribed access point names of said user and the applicability of home routing for other subscribed access point names of said user, said deciding further comprising
    making sub-decisions for those subscribed access point names yielding the applicability of local breakout and for those subscribed access point names yielding the applicability of home routing, and
    combining the sub-decisions made for both groups of access point names such that said access network is decided to be finally trustworthy, when said access network has been decided to be trustworthy for both groups of access point names.
  8. The method according to any one of claims 1 to 3, wherein said determining yields the applicability of local breakout for some of the subscribed access point names of said user and the applicability of home routing for other subscribed access point names of said user, said deciding further comprising
    making separate decisions for those subscribed access point names yielding the applicability of local breakout and for those subscribed access point names yielding the applicability of home routing, and
    informing the user about the separate decisions of final trustworthiness of the access network with regard to the individual subscribed access point names of said user.
  9. The method according to any one of claims 1 to 8, wherein
    said network element of said visited network comprises an authentication, authorization and accounting proxy entity, and/or
    packet data access is provided via an interface between said access network and a packet data network gateway, and/or
    IP mobility management is provided using Proxy Mobile Internet Protocol or Dual-Stack Mobile IP version 6.
  10. The method according to any one of claims 1 to 8, wherein
    said network element of said visited network comprises an evolved packet data gateway, and/or
    packet data access is provided via an interface between said user and a packet data network gateway, and/or
    IP mobility management is provided using Dual-Stack Mobile Internet Protocol version 6.
  11. The method according to any one of claims 1 to 10, wherein said method is operable upon initial attach at or handover to said access network.
  12. The method according to any one of claims 1 to 11, wherein said visited network and a home network of said user belong to an evolved packet system in accordance with 3GPP specifications, and said access network is a non-3GPP access network.
  13. The method according to any one of claims 1 to 12, wherein said method is operable at an authentication, authorization and accounting server in a home network of said user.
  14. An apparatus comprising
    a receiver configured to receive an indication about a provisional trustworthiness of an access network, which provides packet data access for a roaming user, with respect to a visited network of said user from a network element of said visited network,
    characterized in that the apparatus comprises
    a determiner configured to determine the applicability of home routing or local breakout for each subscribed access point name of said user, and
    a decider being configured to decide about a
    final trustworthiness of said access network based upon the received provisional trustworthiness indication and the determined routing applicability for each subscribed
    access point name of said user.
  15. A computer program product comprising program code means being arranged, when run on a processor of an apparatus, to perform the method according to any one of claims 1 to 13.
EP09778916.8A 2009-01-05 2009-01-05 Trustworthiness decision making for access authentication Active EP2384571B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2009/050053 WO2010076044A1 (en) 2009-01-05 2009-01-05 Trustworthiness decision making for access authentication

Publications (2)

Publication Number Publication Date
EP2384571A1 EP2384571A1 (en) 2011-11-09
EP2384571B1 true EP2384571B1 (en) 2015-09-30

Family

ID=41050989

Family Applications (1)

Application Number Title Priority Date Filing Date
EP09778916.8A Active EP2384571B1 (en) 2009-01-05 2009-01-05 Trustworthiness decision making for access authentication

Country Status (5)

Country Link
US (1) US8607309B2 (en)
EP (1) EP2384571B1 (en)
CA (1) CA2748736C (en)
WO (1) WO2010076044A1 (en)
ZA (1) ZA201102895B (en)

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2091204A1 (en) 2008-02-18 2009-08-19 Panasonic Corporation Home agent discovery upon changing the mobility management scheme
CN102448064B (en) 2008-04-11 2015-09-16 艾利森电话股份有限公司 By the access of non-3 GPP access network
EP2194686A1 (en) * 2008-12-03 2010-06-09 Panasonic Corporation Secure tunnel establishment upon attachment or handover to an access network
US20110182206A1 (en) * 2010-01-25 2011-07-28 Qualcomm Incorporated Apparatus and method for associating a gateway control session with an internet protocol connectivity access network (ip-can) session
JP5984825B2 (en) * 2011-04-28 2016-09-06 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America Communication system, mobile terminal, router, and mobility management apparatus
US9270653B2 (en) * 2011-05-11 2016-02-23 At&T Mobility Ii Llc Carrier network security interface for fielded devices
WO2013004435A1 (en) * 2011-07-07 2013-01-10 Nokia Siemens Networks Oy Methods, devices and computer program products providing for ran based lgw selection
WO2012167500A1 (en) * 2011-08-05 2012-12-13 华为技术有限公司 Method for establishing data security channel for tunnel
JP5922785B2 (en) * 2011-11-03 2016-05-24 ▲ホア▼▲ウェイ▼技術有限公司Huawei Technologies Co.,Ltd. Data security channel processing method and device
CN105163398B (en) 2011-11-22 2019-01-18 华为技术有限公司 Connect method for building up and user equipment
US20150089587A1 (en) * 2012-02-10 2015-03-26 Nokia Solutions And Networks Oy Access network trustworthiness detection in core network
EP2829034A1 (en) * 2012-03-23 2015-01-28 Nokia Solutions and Networks Oy Trust indication for wlan access networks
WO2013153542A1 (en) * 2012-04-13 2013-10-17 Telefonaktiebolaget L M Ericsson (Publ) Non-seamless offload indicator
JP2013243673A (en) * 2012-05-21 2013-12-05 Zte Corp Co-existence support for 3gpp device and fixed device bearer transport via fixed broadband access network
CN103582160B (en) * 2012-07-25 2019-05-24 中兴通讯股份有限公司 Data transmission method and device
US9596621B2 (en) 2012-08-10 2017-03-14 Ibasis, Inc. Signaling traffic reduction in mobile communication systems
WO2014054014A1 (en) * 2012-10-02 2014-04-10 Telefonaktiebolaget L M Ericsson (Publ) Method and device for support of multiple pdn connections
US9788188B2 (en) 2012-12-14 2017-10-10 Ibasis, Inc. Method and system for hub breakout roaming
BR112015016050B1 (en) * 2013-01-03 2022-05-24 Huawei Technologies Co., Ltd Systems and methods for accessing a network
EP2954635B1 (en) 2013-02-19 2021-07-28 Huawei Technologies Co., Ltd. Frame structure for filter bank multi-carrier (fbmc) waveforms
US9203827B2 (en) * 2013-06-24 2015-12-01 Infosys Limited Methods for determining authentication requirements of information centric network based services and devices thereof
US9473926B2 (en) * 2013-07-16 2016-10-18 Oracle International Corporation Methods, systems, and computer readable media for supporting local breakout
US10524188B2 (en) * 2014-11-12 2019-12-31 Nokia Technologies Oy Method and apparatus for cellular access point control
JP6577052B2 (en) * 2015-04-22 2019-09-18 華為技術有限公司Huawei Technologies Co.,Ltd. Access point name permission method, access point name permission device, and access point name permission system
US10182053B2 (en) * 2015-05-11 2019-01-15 Telefonaktiebolaget Lm Ericsson (Publ) Methods and nodes for handling access to a service via an untrusted non-3GPP network
JP2016224522A (en) * 2015-05-27 2016-12-28 京セラ株式会社 Terminal device and service server
US10965655B2 (en) * 2015-05-28 2021-03-30 Telefonaktiebolaget Lm Ericsson (Publ) Multiple PDN connections over untrusted WLAN access
JP6151819B2 (en) * 2016-04-14 2017-06-21 ▲ホア▼▲ウェイ▼技術有限公司Huawei Technologies Co.,Ltd. Data security channel processing method and device
US20210235269A1 (en) * 2016-04-19 2021-07-29 Nokia Solutions And Networks Oy Network authorization assistance
EP3244588B1 (en) 2016-05-10 2021-06-23 Nokia Solutions and Networks Oy Support of dedicated core networks for wlan access
US10470031B2 (en) 2016-05-20 2019-11-05 Ibasis, Inc. Voice over IMS roaming gateway
CN109792597B (en) * 2016-09-30 2020-12-22 华为技术有限公司 Local service authorization method and related equipment
US11553561B2 (en) 2016-10-28 2023-01-10 Apple Inc. Protection of the UE identity during 802.1x carrier hotspot and wi-fi calling authentication
US10833876B2 (en) * 2016-10-28 2020-11-10 Apple Inc. Protection of the UE identity during 802.1x carrier hotspot and Wi-Fi calling authentication
CN108377532B (en) * 2016-11-16 2019-08-06 华为技术有限公司 A kind of data connecting method, control plane node and user equipment
WO2018146068A1 (en) * 2017-02-07 2018-08-16 Ipcom Gmbh & Co. Kg Interworking function using untrusted network
US9924344B1 (en) * 2017-06-14 2018-03-20 Syniverse Technologies, Llc Method for providing roaming services in which the home network uses S8HR model for out-bound roaming while the visited network uses LBO model for in-bound roaming
GB2586223A (en) * 2019-08-05 2021-02-17 British Telecomm Conditional message routing in a telecommunications network
EP4059254A4 (en) * 2019-11-11 2023-11-15 Telefonaktiebolaget Lm Ericsson (Publ) Methods for trust information in communication network and related communication equipment and communication device
US11671818B1 (en) 2021-04-29 2023-06-06 T-Mobile Usa, Inc. Reliable local breakout for roaming devices

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2037652A3 (en) 2007-06-19 2009-05-27 Panasonic Corporation Methods and apparatuses for detecting whether user equipment resides in a trusted or a non-trusted access network

Also Published As

Publication number Publication date
WO2010076044A1 (en) 2010-07-08
EP2384571A1 (en) 2011-11-09
CA2748736C (en) 2014-08-12
US20110225632A1 (en) 2011-09-15
US8607309B2 (en) 2013-12-10
CN102273170A (en) 2011-12-07
CA2748736A1 (en) 2010-07-08
ZA201102895B (en) 2011-12-28

Similar Documents

Publication Publication Date Title
EP2384571B1 (en) Trustworthiness decision making for access authentication
US9800563B2 (en) Method and device for processing data security channel
KR101167781B1 (en) System and method for authenticating a context transfer
CN106465227B (en) Method and apparatus for supporting network IP flow mobility via multiple wireless accesses
US8621570B2 (en) Access through non-3GPP access networks
US11271937B2 (en) Method and nodes for handling access to EPC services via a non-3GPP network
KR102390380B1 (en) Support of emergency services over wlan access to 3gpp evolved packet core for unauthenticated users
CN110268734A (en) Use the interworking function of unreliable network
US20120204253A1 (en) Method and apparatus for exchanging data between a user equipment and a core network via a security gateway
EP2858418A1 (en) Method for updating identity information about packet gateway, aaa server and packet gateway
WO2016187871A1 (en) Multiple pdn connections over untrusted wlan access
US20110271117A1 (en) User equipment (ue), home agent node (ha), methods, and telecommunications system for home network prefix (hnp) assignment
WO2009152676A1 (en) Aaa server, p-gw, pcrf, method and system for obtaining the ue's id
US20190223013A1 (en) Method for establishing public data network connection and related device
EP2317694A1 (en) Method and system and user equipment for protocol configuration option transmission
WO2010086029A1 (en) Method and radio communication system for establishing an access to a mobile network domain
JP2014222940A (en) Method for interworking among wireless technologies
CN106664558B (en) Method and device for establishing a connection
KR102103320B1 (en) Mobile terminal, network node server, method and computer program
JP6732794B2 (en) Method for establishing a connection of a mobile terminal to a mobile wireless communication network and a communication network device
CN108924832B (en) Method, device and system for secure Wi-Fi call
CN107005929A (en) A kind of system of selection of packet data gateway, relevant apparatus and system
CN104796941A (en) Congestion control method in case of access core network via TWAN (Trusted WLAN access network) and device
CN102273170B (en) The credible judgement carried out for access authentication

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20110805

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20130123

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: NOKIA SOLUTIONS AND NETWORKS OY

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20150505

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 753018

Country of ref document: AT

Kind code of ref document: T

Effective date: 20151015

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602009033951

Country of ref document: DE

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151230

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20151231

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 753018

Country of ref document: AT

Kind code of ref document: T

Effective date: 20150930

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20160130

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20160131

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20160201

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602009033951

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: LU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20160105

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

26N No opposition filed

Effective date: 20160701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20160131

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20160131

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 9

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20160105

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 10

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20090105

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20160131

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150930

REG Reference to a national code

Ref country code: DE

Ref legal event code: R081

Ref document number: 602009033951

Country of ref document: DE

Owner name: NOKIA TECHNOLOGIES OY, FI

Free format text: FORMER OWNER: NOKIA SOLUTIONS AND NETWORKS OY, ESPOO, FI

REG Reference to a national code

Ref country code: GB

Ref legal event code: 732E

Free format text: REGISTERED BETWEEN 20200402 AND 20200408

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602009033951

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: H04L0029060000

Ipc: H04L0065000000

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230527

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231130

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 20231213

Year of fee payment: 16

Ref country code: NL

Payment date: 20231215

Year of fee payment: 16

Ref country code: FR

Payment date: 20231212

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20231205

Year of fee payment: 16